MLflow Weak Password Requirements Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from weak password requirements. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26916.
History

Thu, 30 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Mlflow
Mlflow mlflow
Vendors & Products Mlflow
Mlflow mlflow

Wed, 29 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Description MLflow Weak Password Requirements Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from weak password requirements. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26916.
Title MLflow Weak Password Requirements Authentication Bypass Vulnerability
Weaknesses CWE-521
References
Metrics cvssV3_0

{'score': 8.1, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2025-10-29T19:42:03.734Z

Updated: 2025-10-31T03:55:31.971Z

Reserved: 2025-09-30T20:33:50.599Z

Link: CVE-2025-11200

cve-icon Vulnrichment

Updated: 2025-10-30T14:34:19.088Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-29T20:15:35.543

Modified: 2025-10-30T15:03:13.440

Link: CVE-2025-11200

cve-icon Redhat

No data.