CVE-2025-15379 - Vulnerability Analysis
CriticalCVSS: 10.0Last Updated: March 30, 2026
MLflow - Command Injection
Overview
MLflow 3.8.0 contains a command injection caused by unsanitized interpolation of python_env.yaml dependencies in _install_model_dependencies_to_env(), letting attackers execute arbitrary commands when deploying models with env_manager=LOCAL.
Severity & Score
Impact
Attackers can execute arbitrary commands on systems deploying malicious model artifacts, potentially leading to full system compromise.
Mitigation
Upgrade to version 3.8.2 or later.
References
Social Media Activity(1 post)
š“ CVE-2025-15379 - Critical (10) A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifi... š https://www.thehackerwire.com/vulnerability/CVE-2025-15379/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-15379
- Severity
- Critical
- CVSS Score
- 10.0
- Type
- command_injection
- Status
- unconfirmed
- EPSS
- 16.8%
- Social Posts
- 1
CWE
- CWE-77
CVSS Metrics
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H