CVE-2024-37054: MLflow: deserialization RCE via malicious PyFunc model
HIGH PoC AVAILABLEAny team running MLflow for model tracking or registry is exposed: an attacker with model upload access can trigger arbitrary code execution on any user who loads a poisoned PyFunc model. Patch immediately and audit your model registry for unauthorized uploads. Enforce strict least-privilege access controls on who can push models to MLflow.
Risk Assessment
High risk (CVSS 8.8). Attack complexity is low and no privileges are required to stage the malicious model — only user interaction (loading it) triggers execution. In shared MLflow environments common across data science teams, a single poisoned model can compromise multiple workstations or CI/CD runners simultaneously. Blast radius scales directly with team size and level of pipeline automation.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
7 steps-
Patch MLflow to the latest available version immediately — this is the primary remediation.
-
Audit the model registry for PyFunc models uploaded by unexpected users or from unknown sources, especially recently.
-
Restrict model upload permissions: apply least privilege so only trusted service accounts can push models to the registry.
-
Implement model artifact signing and integrity verification before loading in any environment.
-
Isolate model loading in sandboxed containers with no production credentials or network access.
-
Monitor for anomalous process spawning from MLflow worker and server processes (e.g., unexpected shells or outbound connections).
-
If immediate patching is not possible, disable PyFunc model loading or gate it behind a manual review workflow.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-37054?
Any team running MLflow for model tracking or registry is exposed: an attacker with model upload access can trigger arbitrary code execution on any user who loads a poisoned PyFunc model. Patch immediately and audit your model registry for unauthorized uploads. Enforce strict least-privilege access controls on who can push models to MLflow.
Is CVE-2024-37054 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-37054, increasing the risk of exploitation.
How to fix CVE-2024-37054?
1. Patch MLflow to the latest available version immediately — this is the primary remediation. 2. Audit the model registry for PyFunc models uploaded by unexpected users or from unknown sources, especially recently. 3. Restrict model upload permissions: apply least privilege so only trusted service accounts can push models to the registry. 4. Implement model artifact signing and integrity verification before loading in any environment. 5. Isolate model loading in sandboxed containers with no production credentials or network access. 6. Monitor for anomalous process spawning from MLflow worker and server processes (e.g., unexpected shells or outbound connections). 7. If immediate patching is not possible, disable PyFunc model loading or gate it behind a manual review workflow.
What systems are affected by CVE-2024-37054?
This vulnerability affects the following AI/ML architecture patterns: MLOps platforms, model registries, training pipelines, experiment tracking, model serving.
What is the CVSS score for CVE-2024-37054?
CVE-2024-37054 has a CVSS v3.1 base score of 8.8 (HIGH). The EPSS exploitation probability is 0.21%.
Technical Details
NVD Description
Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.9.0 or newer, enabling a maliciously uploaded PyFunc model to run arbitrary code on an end user’s system when interacted with.
Exploitation Scenario
An adversary with access to your MLflow tracking server — obtained via a compromised data scientist account, an unauthenticated public-facing MLflow instance, or an insider — uploads a maliciously crafted PyFunc model to the model registry. The model appears legitimate with a plausible name, valid metrics, and realistic parameters. When a data scientist runs mlflow.pyfunc.load_model() during evaluation, or an automated pipeline triggers model validation, the deserialization of the model file executes attacker-controlled code on the host. The adversary gains a shell on the victim machine, which in ML environments typically carries cloud IAM credentials, access to training datasets in S3 or GCS, and connectivity to internal services — turning a model registry upload into full cloud environment compromise.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H References
- hiddenlayer.com/sai-security-advisory/mlflow-june2024 Exploit 3rd Party
- github.com/NiteeshPujari/CVE-2024-37054-MLflow-RCE Exploit
- github.com/PuddinCat/GithubRepoSpider Exploit
- github.com/zulloper/cve-poc Exploit
Timeline
Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert