CVE-2025-15036: A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artif
Summary
A path traversal vulnerability (a security flaw where an attacker uses special path names like '../' to access files outside intended directories) exists in MLflow's archive extraction function that doesn't validate the contents of tar.gz files before extracting them. An attacker who controls the tar.gz file can overwrite arbitrary files or escape sandbox restrictions (isolated environments that limit what code can access) in shared computing environments.
Solution / Mitigation
Update to mlflow version v3.7.0 or later.
Vulnerability Details
EPSS: 0.0%
March 29, 2026
Classification
Affected Vendors
Related Issues
Original source: https://nvd.nist.gov/vuln/detail/CVE-2025-15036
First tracked: March 30, 2026 at 02:07 AM
Classified by LLM (prompt v3) · confidence: 92%