Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. mlflow
  4. ›
  5. CVE-2026-2033

CVE-2026-2033: MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability

February 21, 2026 (updated March 17, 2026)

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of artifact file paths. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account.

References

  • github.com/advisories/GHSA-q2r8-vmq7-fpx2
  • github.com/mlflow/mlflow
  • github.com/mlflow/mlflow/commit/5bf2ec2bd4222a18d78631183ac7f6b752afe8a4
  • github.com/mlflow/mlflow/pull/19260
  • github.com/mlflow/mlflow/releases/tag/v3.8.0rc0
  • nvd.nist.gov/vuln/detail/CVE-2026-2033
  • www.zerodayinitiative.com/advisories/ZDI-26-105

Code Behaviors & Features

Detect and mitigate CVE-2026-2033 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.8.0rc0

Fixed versions

  • 3.8.0rc0

Solution

Upgrade to version 3.8.0rc0 or above.

Impact 8.1 HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

pypi/mlflow/CVE-2026-2033.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:16:59 +0000.