CVE-2025-15381 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 30, 2026
mlflow/mlflow - Broken Access Control
Overview
mlflow/mlflow with basic-auth app enabled contains a broken access control vulnerability caused by missing permission validators on tracing and assessment endpoints, letting authenticated users with no permissions read trace data and create unauthorized assessments, exploit requires authentication.
Severity & Score
Impact
Authenticated users with no permissions can read trace metadata and create unauthorized assessments, impacting confidentiality and integrity.
Mitigation
Update to the latest version where permission validators protect tracing and assessment endpoints.
Social Media Activity(1 post)
š CVE-2025-15381 - High (8.1) In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment,... š https://www.thehackerwire.com/vulnerability/CVE-2025-15381/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-15381
- Severity
- High
- CVSS Score
- 8.1
- Type
- broken_access_control
- Status
- unconfirmed
- EPSS
- 1.0%
- Social Posts
- 1
CWE
- CWE-200
CVSS Metrics
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N