Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. mlflow
  4. ›
  5. CVE-2025-14279

CVE-2025-14279: MLFlow is vulnerable to DNS rebinding attacks due to a lack of Origin header validation

January 12, 2026 (updated January 13, 2026)

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. An attacker can query, update, and delete experiments via the affected endpoints, leading to potential data exfiltration, destruction, or manipulation. The issue is resolved in version 3.5.0.

References

  • github.com/advisories/GHSA-pgqp-8h46-6x4j
  • github.com/mlflow/mlflow
  • github.com/mlflow/mlflow/commit/b0ffd289e9b0d0cc32c9e3a9b9f3843ae83dbec3
  • github.com/mlflow/mlflow/pull/17910
  • huntr.com/bounties/ef478f72-2e4f-44dc-8055-fc06bef03108
  • nvd.nist.gov/vuln/detail/CVE-2025-14279

Code Behaviors & Features

Detect and mitigate CVE-2025-14279 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.5.0

Fixed versions

  • 3.5.0

Solution

Upgrade to version 3.5.0 or above.

Impact 8.1 HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-346: Origin Validation Error

Source file

pypi/mlflow/CVE-2025-14279.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:36:05 +0000.