CVE-2023-6831: MLflow: path traversal allows arbitrary file write
HIGH PoC AVAILABLE NUCLEI TEMPLATEMLflow before 2.9.2 allows any authenticated low-privileged user to write or delete arbitrary files on the server via path traversal (CVSS 8.1). Upgrade to 2.9.2 immediately—every MLflow experiment tracking server with multi-user or external access is exposed. In AI/ML pipelines, this translates directly to model artifact poisoning risk without triggering standard deployment alerts.
Risk Assessment
High risk. Network-accessible, low complexity, requires only low-level credentials, and no user interaction—making this trivially weaponizable in multi-tenant or shared ML environments. AI/ML teams routinely deploy MLflow with permissive access controls to facilitate collaboration, significantly broadening the attack surface. The integrity and availability impact on model artifacts makes this particularly dangerous in production ML pipelines where trust in model provenance is assumed.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch immediately: upgrade MLflow to 2.9.2 or later.
-
Restrict network access: place MLflow behind VPN or restrict to internal networks if not already done.
-
Audit access: review and enforce least-privilege on MLflow API credentials.
-
Verify artifact integrity: inspect registered model artifacts for unexpected modifications, especially in production registries.
-
Enable audit logging and alert on path traversal patterns ('../', '%2e%2e', '%252e') in MLflow API requests.
-
If patching is delayed, deploy WAF rules blocking traversal sequences on MLflow endpoints as a temporary control.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2023-6831?
MLflow before 2.9.2 allows any authenticated low-privileged user to write or delete arbitrary files on the server via path traversal (CVSS 8.1). Upgrade to 2.9.2 immediately—every MLflow experiment tracking server with multi-user or external access is exposed. In AI/ML pipelines, this translates directly to model artifact poisoning risk without triggering standard deployment alerts.
Is CVE-2023-6831 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2023-6831, increasing the risk of exploitation.
How to fix CVE-2023-6831?
1. Patch immediately: upgrade MLflow to 2.9.2 or later. 2. Restrict network access: place MLflow behind VPN or restrict to internal networks if not already done. 3. Audit access: review and enforce least-privilege on MLflow API credentials. 4. Verify artifact integrity: inspect registered model artifacts for unexpected modifications, especially in production registries. 5. Enable audit logging and alert on path traversal patterns ('../', '%2e%2e', '%252e') in MLflow API requests. 6. If patching is delayed, deploy WAF rules blocking traversal sequences on MLflow endpoints as a temporary control.
What systems are affected by CVE-2023-6831?
This vulnerability affects the following AI/ML architecture patterns: ML experiment tracking, model registries, training pipelines, model serving.
What is the CVSS score for CVE-2023-6831?
CVE-2023-6831 has a CVSS v3.1 base score of 8.1 (HIGH). The EPSS exploitation probability is 73.98%.
Technical Details
NVD Description
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
Exploitation Scenario
An adversary with compromised data scientist credentials or a malicious insider crafts an artifact upload request containing path traversal sequences (e.g., '..\..\etc\cron.d\backdoor' or '..\..\app\models\production_model.pkl') to overwrite a registered production model artifact. In a CI/CD-integrated MLflow deployment, the poisoned model passes standard validation checks because its metadata and registry entry remain legitimate—only the underlying file is replaced. The attack completes before the next scheduled deployment cycle, silently deploying a backdoored model to inference infrastructure. Alternatively, the attacker deletes training checkpoints to cause denial of service to active training runs.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H References
Timeline
Scanner Template Available
A Nuclei vulnerability scanner template exists for this CVE. You can scan your infrastructure for this vulnerability immediately.
View template on GitHubnuclei -t http/cves/2023/CVE-2023-6831.yaml -u https://target.example.com Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert