LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2025-15031

CVE-2025-15031 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: March 19, 2026

MLflow - Unrestricted File Upload

Published: March 18, 2026Updated: March 19, 2026

Overview

MLflow contains an unrestricted file upload caused by improper path validation in tarfile.extractall during pyfunc extraction, letting attackers write arbitrary files and potentially execute code remotely, exploit requires crafted tar.gz files.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 3.0%(Probability of exploitation in next 30 days)

Impact

Attackers can overwrite arbitrary files and potentially execute code remotely, risking full system compromise in multi-tenant or untrusted artifact scenarios.

Mitigation

Update to the latest version of MLflow.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 18, 2026

🟠 CVE-2025-15031 - High (8.1) A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2025-15031/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2025-15031
Severity
High
CVSS Score
8.1
Type
unrestricted_file_upload
Status
unconfirmed
EPSS
3.0%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS Score

3.0%Probability of exploitation in the next 30 days