Cross-site Scripting (XSS) Affecting mlflow package, versions <3.11.1-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-MLFLOW-16333964
  • published1 May 2026
  • disclosed7 Apr 2026

Introduced: 7 Apr 2026

CVE-2026-33865  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Chainguard mlflow to version 3.11.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mlflow package and not the mlflow package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

MLflow is vulnerable to Stored Cross-Site Scripting (XSS) caused by unsafe parsing of YAML-based MLmodel artifacts in its web interface. An authenticated attacker can upload a malicious MLmodel file containing a payload that executes when another user views the artifact in the UI. This allows actions such as session hijacking or performing operations on behalf of the victim.

This issue affects MLflow version through 3.10.1

CVSS Base Scores

version 3.1