CVE-2023-3765: MLflow: path traversal allows arbitrary file read
CRITICAL PoC AVAILABLE NUCLEI TEMPLATE CISA: ATTENDMLflow instances prior to 2.5.0 expose the entire host filesystem to unauthenticated remote attackers — CVSS 10.0, zero prerequisites. Patch to 2.5.0 immediately and treat any exposed pre-patch instance as fully compromised. Assume model weights, training data, .env files, and cloud credentials (AWS keys, GCP service accounts) have been exfiltrated.
Risk Assessment
Severity is maximum: CVSS 10.0 with network attack vector, no privileges required, no user interaction, and scope change. MLflow is routinely deployed without authentication in data science environments (notebooks, shared servers, internal tooling), making it trivially discoverable and exploitable. The changed scope (S:C) means exploitation can cascade beyond the MLflow process to the underlying host. EPSS data is unavailable but the simplicity of exploitation and public PoC availability on huntr.dev elevate practical risk significantly.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
PATCH
Upgrade MLflow to 2.5.0 or later immediately.
-
NETWORK
Place MLflow behind a VPN or internal network — it must not be internet-facing without authentication.
-
AUDIT
Review access logs for requests containing '../', '/', or absolute paths in file parameters; treat any hits as confirmed breach.
-
ROTATE
Immediately rotate all credentials (AWS, GCP, database, SSH keys) stored on or accessible from the MLflow host.
-
DETECT
Add WAF rules or IDS signatures for path traversal patterns in MLflow API endpoints (/api/2.0/mlflow/artifacts/get-content, logged_model paths).
-
ISOLATE
Run MLflow with a dedicated service account with minimal filesystem permissions; use read-only mounts for artifact directories.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2023-3765?
MLflow instances prior to 2.5.0 expose the entire host filesystem to unauthenticated remote attackers — CVSS 10.0, zero prerequisites. Patch to 2.5.0 immediately and treat any exposed pre-patch instance as fully compromised. Assume model weights, training data, .env files, and cloud credentials (AWS keys, GCP service accounts) have been exfiltrated.
Is CVE-2023-3765 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2023-3765, increasing the risk of exploitation.
How to fix CVE-2023-3765?
1. PATCH: Upgrade MLflow to 2.5.0 or later immediately. 2. NETWORK: Place MLflow behind a VPN or internal network — it must not be internet-facing without authentication. 3. AUDIT: Review access logs for requests containing '../', '/', or absolute paths in file parameters; treat any hits as confirmed breach. 4. ROTATE: Immediately rotate all credentials (AWS, GCP, database, SSH keys) stored on or accessible from the MLflow host. 5. DETECT: Add WAF rules or IDS signatures for path traversal patterns in MLflow API endpoints (/api/2.0/mlflow/artifacts/get-content, logged_model paths). 6. ISOLATE: Run MLflow with a dedicated service account with minimal filesystem permissions; use read-only mounts for artifact directories.
What systems are affected by CVE-2023-3765?
This vulnerability affects the following AI/ML architecture patterns: ML experiment tracking platforms, model registries, training pipelines, MLOps platforms, data science workbenches, model serving infrastructure.
What is the CVSS score for CVE-2023-3765?
CVE-2023-3765 has a CVSS v3.1 base score of 10.0 (CRITICAL). The EPSS exploitation probability is 91.45%.
Technical Details
NVD Description
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0.
Exploitation Scenario
An adversary scans for exposed MLflow servers (Shodan query for MLflow UI banners is publicly documented). They find an internal data science team's MLflow instance accessible on a corporate subnet or misconfigured cloud security group. Without any credentials, they craft HTTP requests using absolute path traversal to read /etc/passwd (host enumeration), then /home/datascientist/.aws/credentials (cloud keys), followed by the MLflow artifact store configuration to locate model weights and training data. Within minutes they have valid AWS credentials, can access the S3 bucket containing all production model artifacts, and can exfiltrate or tamper with models deployed to production inference endpoints — all without triggering authentication alerts.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H References
Timeline
Scanner Template Available
A Nuclei vulnerability scanner template exists for this CVE. You can scan your infrastructure for this vulnerability immediately.
View template on GitHubnuclei -t http/cves/2023/CVE-2023-3765.yaml -u https://target.example.com Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2023-6018 9.8 MLflow: unauth file overwrite enables model poisoning
Same package: mlflow
AI Threat Alert