CVE-2025-14287: MLflow has a command injection in mlflow/sagemaker/__init__.py
(updated )
A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the mlflow/sagemaker/__init__.py file at lines 161-167. The vulnerability arises from the direct interpolation of user-supplied container image names into shell commands without proper sanitization, which are then executed using os.system(). This allows attackers to execute arbitrary commands by supplying malicious input through the --container parameter of the CLI. The issue affects environments where MLflow is used, including development setups, CI/CD pipelines, and cloud deployments.
References
- github.com/advisories/GHSA-xch3-2f9x-wh9f
- github.com/mlflow/mlflow
- github.com/mlflow/mlflow/commit/8b8792a7034fb33a14b0b31cabcaa9b912d3485f
- github.com/mlflow/mlflow/pull/19277
- github.com/mlflow/mlflow/releases/tag/v3.8.0rc0
- huntr.com/bounties/229cd526-41aa-4819-b6f0-e2d0371c89e3
- nvd.nist.gov/vuln/detail/CVE-2025-14287
Code Behaviors & Features
Detect and mitigate CVE-2025-14287 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →