CVE-2025-15031 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 19, 2026
MLflow - Unrestricted File Upload
Overview
MLflow contains an unrestricted file upload caused by improper path validation in tarfile.extractall during pyfunc extraction, letting attackers write arbitrary files and potentially execute code remotely, exploit requires crafted tar.gz files.
Severity & Score
Impact
Attackers can overwrite arbitrary files and potentially execute code remotely, risking full system compromise in multi-tenant or untrusted artifact scenarios.
Mitigation
Update to the latest version of MLflow.
Social Media Activity(1 post)
š CVE-2025-15031 - High (8.1) A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `... š https://www.thehackerwire.com/vulnerability/CVE-2025-15031/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-15031
- Severity
- High
- CVSS Score
- 8.1
- Type
- unrestricted_file_upload
- Status
- unconfirmed
- EPSS
- 3.0%
- Social Posts
- 1
CWE
- CWE-22
CVSS Metrics
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N