Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. mlflow
  4. ›
  5. CVE-2026-33866

CVE-2026-33866: MLflow is vulnerable to an authorization bypass affecting the AJAX endpoint

April 7, 2026 (updated April 27, 2026)

MLflow is vulnerable to an authorization bypass affecting the AJAX endpoint used to download saved model artifacts. Due to missing access‑control validation, a user without permissions to a given experiment can directly query this endpoint and retrieve model artifacts they are not authorized to access.

This issue affects MLflow version through 3.10.1

References

  • afine.com/blogs/attacking-mlflow-how-ml-artifacts-become-attack-vectors
  • cert.pl/en/posts/2026/04/CVE-2026-33865
  • github.com/advisories/GHSA-46r5-x6jq-v8g6
  • github.com/mlflow/mlflow
  • github.com/mlflow/mlflow/commit/005b959cacda05d1423356cfcbd9ebeda8ff96a7
  • github.com/mlflow/mlflow/pull/21708
  • nvd.nist.gov/vuln/detail/CVE-2026-33866

Code Behaviors & Features

Detect and mitigate CVE-2026-33866 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 3.10.1

Solution

Unfortunately, there is no solution available yet.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-862: Missing Authorization

Source file

pypi/mlflow/CVE-2026-33866.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:17:52 +0000.