CVE-2025-14287
Published: 16 March 2026
Description
A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct interpolation of user-supplied container image names into shell commands without proper sanitization, which are then executed…
more
using `os.system()`. This allows attackers to execute arbitrary commands by supplying malicious input through the `--container` parameter of the CLI. The issue affects environments where MLflow is used, including development setups, CI/CD pipelines, and cloud deployments.
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates validation of user-supplied inputs such as container image names to prevent command injection via unsanitized interpolation into os.system shell commands.
Requires timely identification, testing, and application of flaw remediation such as upgrading MLflow to v3.7.0 or later to fix the vulnerability.
Enables monitoring for indicators of command injection exploitation, such as anomalous shell command executions in MLflow CLI usage across dev, CI/CD, and cloud environments.
Security SummaryAI
CVE-2025-14287 is a command injection vulnerability in mlflow/mlflow versions before v3.7.0, located in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The flaw occurs due to the direct interpolation of user-supplied container image names into shell commands without sanitization, followed by execution via `os.system()`. Attackers can exploit this by providing malicious input through the `--container` parameter of the MLflow CLI, impacting environments such as development setups, CI/CD pipelines, and cloud deployments where MLflow is used for machine learning workflows.
The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and maps to CWE-94 (Improper Control of Generation of Code). Exploitation requires network access with low complexity and no privileges, but user interaction is needed, such as tricking a legitimate user into running the affected CLI command with a crafted `--container` argument. Successful exploitation enables arbitrary command execution on the host system, potentially leading to high confidentiality, integrity, and availability impacts.
Mitigation involves upgrading to mlflow/mlflow version v3.7.0 or later, where the issue is addressed. Additional details are available in the Huntr advisory at https://huntr.com/bounties/229cd526-41aa-4819-b6f0-e2d0371c89e3.
This vulnerability is particularly relevant to AI/ML practitioners, as MLflow is a widely used open-source platform for managing machine learning lifecycles, and exploitation could compromise sensitive training data or models in affected deployments. No public information on real-world exploitation is available as of the CVE publication on 2026-03-16.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a command injection flaw via unsanitized user input to os.system() in the MLflow CLI, directly enabling arbitrary Unix shell command execution (T1059.004) in SageMaker/Linux contexts and exploitation for client-side code execution (T1203) by tricking users into running crafted CLI commands.