CVE-2023-6014: MLflow: auth bypass allows arbitrary account creation
CRITICAL PoC AVAILABLE CISA: ATTENDAny unauthenticated attacker with network access to your MLflow instance can create accounts — including admin-level accounts — without any credentials. If MLflow is exposed beyond localhost (internal network, VPN, or internet), treat this as a full platform compromise: attacker gains access to experiments, model artifacts, and training data. Patch immediately and audit existing accounts for unauthorized entries.
Risk Assessment
CRITICAL. CVSS 9.8 with AV:N/AC:L/PR:N/UI:N makes this trivially exploitable by any attacker with network reach. MLflow is frequently deployed with minimal network controls in data science environments, often on internal ports accessible to broad corporate segments or even exposed to the internet. The combination of zero-barrier exploitation and access to high-value ML assets (models, training data, experiment logs) elevates real-world risk beyond the already-critical score.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
IMMEDIATE
Restrict MLflow network access to localhost or VPN-only via firewall rules — block public/internal exposure if patching is delayed.
-
PATCH
Upgrade MLflow to the version that addresses this vulnerability (check huntr advisory for specific fixed version; review MLflow changelog post-2023-11-16).
-
AUDIT
Query MLflow user database for accounts created after the vulnerability disclosure date; remove unrecognized accounts and rotate all API tokens.
-
DETECT
Enable MLflow access logs and alert on account creation events; correlate with known user provisioning workflows.
-
HARDEN
Deploy MLflow behind a reverse proxy with authentication (OAuth2/OIDC) as a defense-in-depth layer regardless of built-in auth status.
-
VERIFY
Confirm no unauthorized model versions were registered or existing models tampered with post-incident.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2023-6014?
Any unauthenticated attacker with network access to your MLflow instance can create accounts — including admin-level accounts — without any credentials. If MLflow is exposed beyond localhost (internal network, VPN, or internet), treat this as a full platform compromise: attacker gains access to experiments, model artifacts, and training data. Patch immediately and audit existing accounts for unauthorized entries.
Is CVE-2023-6014 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2023-6014, increasing the risk of exploitation.
How to fix CVE-2023-6014?
1. IMMEDIATE: Restrict MLflow network access to localhost or VPN-only via firewall rules — block public/internal exposure if patching is delayed. 2. PATCH: Upgrade MLflow to the version that addresses this vulnerability (check huntr advisory for specific fixed version; review MLflow changelog post-2023-11-16). 3. AUDIT: Query MLflow user database for accounts created after the vulnerability disclosure date; remove unrecognized accounts and rotate all API tokens. 4. DETECT: Enable MLflow access logs and alert on account creation events; correlate with known user provisioning workflows. 5. HARDEN: Deploy MLflow behind a reverse proxy with authentication (OAuth2/OIDC) as a defense-in-depth layer regardless of built-in auth status. 6. VERIFY: Confirm no unauthorized model versions were registered or existing models tampered with post-incident.
What systems are affected by CVE-2023-6014?
This vulnerability affects the following AI/ML architecture patterns: MLOps platforms, model registry, training pipelines, experiment tracking, model serving.
What is the CVSS score for CVE-2023-6014?
CVE-2023-6014 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 0.88%.
Technical Details
NVD Description
An attacker is able to arbitrarily create an account in MLflow bypassing any authentication requirment.
Exploitation Scenario
Adversary scans for MLflow instances on default port 5000 or common enterprise ports. Using the huntr PoC, sends a crafted HTTP GET request with credentials embedded in query parameters to the MLflow account creation endpoint, bypassing authentication checks. Within seconds, the attacker has a valid MLflow account. They proceed to enumerate all registered models via the Model Registry API, download production model binaries for IP theft or offline analysis, inspect experiment runs to reconstruct proprietary training pipelines and datasets, and register a backdoored model version pointing to a malicious artifact — which downstream CI/CD pipelines may automatically promote to staging or production.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- huntr.com/bounties/3e64df69-ddc2-463e-9809-d07c24dc1de4 Exploit Issue 3rd Party
- github.com/20142995/nuclei-templates Exploit
- github.com/cyb3r-w0lf/nuclei-template-collection Exploit
- github.com/google/tsunami-security-scanner-plugins Exploit
Timeline
Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert