CVE-2023-6909: MLflow: path traversal exposes arbitrary files (no auth)
HIGH PoC AVAILABLE NUCLEI TEMPLATEMLflow servers prior to 2.9.2 allow unauthenticated remote attackers to read arbitrary files via path traversal—no credentials needed. In MLOps environments this directly risks exposure of model artifacts, training data, API keys, and credentials stored on the MLflow host. Upgrade to 2.9.2+ immediately and restrict MLflow network exposure to trusted networks only.
Risk Assessment
HIGH. CVSS vector AV:N/AC:L/PR:N/UI:N makes this trivially exploitable by any attacker with network access. MLflow instances are frequently deployed with internet or broad internal exposure for team collaboration. The confidentiality impact is severe: MLflow servers routinely hold experiment configs, model weights, API keys in .env files, cloud credentials, and data paths. No active KEV listing, but the zero-barrier exploitation and sensitivity of MLflow server contents make this a priority patch for any MLOps team.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Upgrade MLflow to 2.9.2 or later immediately.
-
NETWORK CONTROLS
Restrict MLflow server access to trusted VPN/internal networks; remove any public internet exposure.
-
LEAST PRIVILEGE
Run MLflow with a dedicated service account with minimal filesystem permissions—limit readable directories to experiment artifacts only.
-
DETECTION
Search web/application logs for requests containing '../', '%2e%2e', or '..\\' patterns targeting MLflow endpoints.
-
AUDIT
Review MLflow server filesystem for sensitive files (credentials, SSH keys) and relocate them outside the accessible path.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2023-6909?
MLflow servers prior to 2.9.2 allow unauthenticated remote attackers to read arbitrary files via path traversal—no credentials needed. In MLOps environments this directly risks exposure of model artifacts, training data, API keys, and credentials stored on the MLflow host. Upgrade to 2.9.2+ immediately and restrict MLflow network exposure to trusted networks only.
Is CVE-2023-6909 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2023-6909, increasing the risk of exploitation.
How to fix CVE-2023-6909?
1. PATCH: Upgrade MLflow to 2.9.2 or later immediately. 2. NETWORK CONTROLS: Restrict MLflow server access to trusted VPN/internal networks; remove any public internet exposure. 3. LEAST PRIVILEGE: Run MLflow with a dedicated service account with minimal filesystem permissions—limit readable directories to experiment artifacts only. 4. DETECTION: Search web/application logs for requests containing '../', '%2e%2e', or '..\\' patterns targeting MLflow endpoints. 5. AUDIT: Review MLflow server filesystem for sensitive files (credentials, SSH keys) and relocate them outside the accessible path.
What systems are affected by CVE-2023-6909?
This vulnerability affects the following AI/ML architecture patterns: ML experiment tracking, model registry, training pipelines, MLOps infrastructure, CI/CD for ML.
What is the CVSS score for CVE-2023-6909?
CVE-2023-6909 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 85.72%.
Technical Details
NVD Description
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
Exploitation Scenario
An attacker scans for exposed MLflow instances (default port 5000) via Shodan or similar. With no authentication required, they craft a GET request with a path traversal payload (e.g., /get-artifact?path=../../../../etc/passwd or ~/.aws/credentials). In a typical MLOps pipeline, MLflow runs with access to training data storage, model registries, and CI/CD secrets. The attacker iterates through common credential paths to extract cloud provider keys, enabling lateral movement to S3/GCS buckets containing training data or production model artifacts—potentially poisoning future model versions.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References
Timeline
Scanner Template Available
A Nuclei vulnerability scanner template exists for this CVE. You can scan your infrastructure for this vulnerability immediately.
View template on GitHubnuclei -t http/cves/2023/CVE-2023-6909.yaml -u https://target.example.com Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert