CVE-2023-1177: MLflow: path traversal allows arbitrary file read/write
CRITICAL ACTIVELY EXPLOITED PoC AVAILABLE NUCLEI TEMPLATE CISA: TRACK*Unauthenticated path traversal in MLflow (CVSS 9.8) lets any network-reachable attacker read or write arbitrary files on your ML platform server. If MLflow is reachable from untrusted networks — including internal segments without strong access controls — treat this as active compromise risk: attackers can steal models, training data, and credentials stored on the filesystem. Patch to 2.2.1 immediately and audit all MLflow network exposure.
Risk Assessment
Extremely high. CVSS 9.8 with no authentication, no user interaction, and full CIA impact. MLflow servers are routinely deployed without authentication enabled on internal networks or even internet-facing, making this trivially exploitable by automated scanners. MLflow instances hold high-value AI assets — trained models, experiment artifacts, hyperparameters, cloud credentials — making them an attractive target. The low attack complexity means weaponized exploits are accessible to low-skill actors.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
PATCH
Upgrade MLflow to 2.2.1 or later immediately — this is the only complete fix.
-
ISOLATE
Ensure MLflow is not exposed to the public internet; restrict access via firewall rules and network segmentation.
-
AUTHENTICATE
Enable authentication if supported by your version; otherwise place behind an authenticated reverse proxy (nginx + OAuth2 proxy, Cloudflare Access).
-
AUDIT LOGS
Search server logs for path traversal patterns — sequences containing ../, ..\ or URL-encoded equivalents (%2e%2e%2f) in artifact or file endpoint requests.
-
ROTATE CREDENTIALS
Assume all secrets stored on the MLflow server filesystem (API keys, .env files, ~/.aws/credentials, database passwords) are compromised; rotate immediately.
-
INVENTORY
Identify all MLflow instances across environments (dev, staging, prod) and confirm patch status for each.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2023-1177?
Unauthenticated path traversal in MLflow (CVSS 9.8) lets any network-reachable attacker read or write arbitrary files on your ML platform server. If MLflow is reachable from untrusted networks — including internal segments without strong access controls — treat this as active compromise risk: attackers can steal models, training data, and credentials stored on the filesystem. Patch to 2.2.1 immediately and audit all MLflow network exposure.
Is CVE-2023-1177 actively exploited?
Yes, CVE-2023-1177 is confirmed actively exploited and listed in CISA Known Exploited Vulnerabilities catalog.
How to fix CVE-2023-1177?
1. PATCH: Upgrade MLflow to 2.2.1 or later immediately — this is the only complete fix. 2. ISOLATE: Ensure MLflow is not exposed to the public internet; restrict access via firewall rules and network segmentation. 3. AUTHENTICATE: Enable authentication if supported by your version; otherwise place behind an authenticated reverse proxy (nginx + OAuth2 proxy, Cloudflare Access). 4. AUDIT LOGS: Search server logs for path traversal patterns — sequences containing ../, ..\ or URL-encoded equivalents (%2e%2e%2f) in artifact or file endpoint requests. 5. ROTATE CREDENTIALS: Assume all secrets stored on the MLflow server filesystem (API keys, .env files, ~/.aws/credentials, database passwords) are compromised; rotate immediately. 6. INVENTORY: Identify all MLflow instances across environments (dev, staging, prod) and confirm patch status for each.
What systems are affected by CVE-2023-1177?
This vulnerability affects the following AI/ML architecture patterns: MLOps platforms, model registry, training pipelines, experiment tracking systems, model serving infrastructure.
What is the CVSS score for CVE-2023-1177?
CVE-2023-1177 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 93.31%.
Technical Details
NVD Description
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
Exploitation Scenario
An adversary scans corporate cloud environments and identifies an unpatched MLflow tracking server accessible on an internal VPC segment. Without credentials, they send a crafted HTTP GET to the artifact API with a path traversal sequence to enumerate filesystem structure. Within minutes they retrieve ~/.aws/credentials, obtaining cloud access keys with broad S3 and SageMaker permissions. They then read stored model artifact files — obtaining proprietary model weights trained on sensitive data. As a final stage, they overwrite a registered production model binary with a backdoored version that, when loaded by the serving infrastructure, silently exfiltrates a copy of every inference request payload to an attacker-controlled endpoint. The attack produces no authentication failures and blends into normal artifact access patterns.
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- github.com/mlflow/mlflow/pull/7891/commits/7162a50c654792c21f3e4a160eb1a0e6a34f6e6e Patch
- huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28 Exploit Patch 3rd Party
- github.com/0day404/vulnerability-poc Exploit
- github.com/ARPSyndicate/cvemon Exploit
- github.com/EssenceCyber/Exploit-List Exploit
- github.com/J1ezds/Vulnerability-Wiki-page Exploit
- github.com/KayCHENvip/vulnerability-poc Exploit
- github.com/SpycioKon/CVE-2023-1177-rebuild Exploit
- github.com/Threekiii/Awesome-POC Exploit
- github.com/XiaomingX/awesome-poc-for-red-team Exploit
- github.com/alphandbelt1/CVE-2023-1177-MLFlow Exploit
- github.com/charlesgargasson/CVE-2023-1177 Exploit
- github.com/charlesgargasson/charlesgargasson Exploit
- github.com/d4n-sec/d4n-sec.github.io Exploit
- github.com/google/tsunami-security-scanner-plugins Exploit
- github.com/hh-hunter/ml-CVE-2023-1177 Exploit
- github.com/intercladire/Awesome-POC Exploit
- github.com/iumiro/CVE-2023-1177-MLFlow Exploit
- github.com/nomi-sec/PoC-in-GitHub Exploit
- github.com/paultheal1en/CVE-2023-1177-PoC-reproduce Exploit
- github.com/plzheheplztrying/cve_monitor Exploit
- github.com/powned/Snaike-MLflow Exploit
- github.com/protectai/Snaike-MLflow Exploit
- github.com/saimahmed/MLflow-Vuln Exploit
- github.com/tiyeume25112004/CVE-2023-1177-rebuild Exploit
Timeline
Scanner Template Available
A Nuclei vulnerability scanner template exists for this CVE. You can scan your infrastructure for this vulnerability immediately.
View template on GitHubnuclei -t http/cves/2023/CVE-2023-1177.yaml -u https://target.example.com Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2023-6018 9.8 MLflow: unauth file overwrite enables model poisoning
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow
AI Threat Alert