CVE-2024-37061: MLflow: RCE via malicious MLproject file execution
HIGH PoC AVAILABLE CISA: ATTENDAny MLflow deployment running version 1.11.0 or later is vulnerable to arbitrary code execution if a user runs a maliciously crafted MLproject file. This is a realistic social engineering vector in ML teams that routinely share experiment configurations via repos or model hubs. Patch immediately and audit who can submit MLproject files to shared ML platforms.
Risk Assessment
HIGH risk for organizations with active MLflow deployments. CVSS 8.8 reflects low attack complexity and no privilege requirement — only user interaction needed, which is trivially achieved in ML environments where sharing MLproject configs is standard practice. The attack surface expands significantly in collaborative ML platforms, shared experiment trackers, and CI/CD pipelines that auto-execute MLprojects from repos. No KEV listing yet, but the exploit reference from HiddenLayer indicates public PoC availability.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
PATCH
Upgrade MLflow to the latest patched version immediately. Verify via
pip show mlflow. -
RESTRICT
Block execution of MLproject files from untrusted sources at the process and policy level. Implement allowlists for MLproject sources.
-
SANDBOX
Run
mlflow runin isolated containers with no network access and minimal filesystem permissions. -
AUDIT
Review CI/CD pipelines that auto-execute MLproject files — add approval gates for any externally sourced projects.
-
DETECT
Alert on unexpected outbound connections or process spawns from MLflow worker processes. Monitor for
mlflow runexecutions against non-internal URIs. -
REVIEW
Audit shared MLproject files in internal repos for malicious code patterns, especially in entry_points and conda.yaml/requirements.txt sections.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-37061?
Any MLflow deployment running version 1.11.0 or later is vulnerable to arbitrary code execution if a user runs a maliciously crafted MLproject file. This is a realistic social engineering vector in ML teams that routinely share experiment configurations via repos or model hubs. Patch immediately and audit who can submit MLproject files to shared ML platforms.
Is CVE-2024-37061 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-37061, increasing the risk of exploitation.
How to fix CVE-2024-37061?
1. PATCH: Upgrade MLflow to the latest patched version immediately. Verify via `pip show mlflow`. 2. RESTRICT: Block execution of MLproject files from untrusted sources at the process and policy level. Implement allowlists for MLproject sources. 3. SANDBOX: Run `mlflow run` in isolated containers with no network access and minimal filesystem permissions. 4. AUDIT: Review CI/CD pipelines that auto-execute MLproject files — add approval gates for any externally sourced projects. 5. DETECT: Alert on unexpected outbound connections or process spawns from MLflow worker processes. Monitor for `mlflow run` executions against non-internal URIs. 6. REVIEW: Audit shared MLproject files in internal repos for malicious code patterns, especially in entry_points and conda.yaml/requirements.txt sections.
What systems are affected by CVE-2024-37061?
This vulnerability affects the following AI/ML architecture patterns: training pipelines, MLOps platforms, experiment tracking, CI/CD ML pipelines, model registries.
What is the CVSS score for CVE-2024-37061?
CVE-2024-37061 has a CVSS v3.1 base score of 8.8 (HIGH). The EPSS exploitation probability is 3.95%.
Technical Details
NVD Description
Remote Code Execution can occur in versions of the MLflow platform running version 1.11.0 or newer, enabling a maliciously crafted MLproject to execute arbitrary code on an end user’s system when run.
Exploitation Scenario
Attacker publishes a weaponized MLproject to a public GitHub repository or submits it to an internal ML experiment tracker. The MLproject's entry_points section contains a malicious command disguised as a training script invocation. A data scientist or automated CI/CD pipeline runs `mlflow run <malicious-repo>`. MLflow clones the project and executes the entry point, triggering arbitrary code execution on the host. From there, the attacker can dump cloud credentials from the execution environment (common in AWS/GCP ML workloads), exfiltrate model weights and training data, or establish persistence in the MLOps infrastructure. The attack is especially effective against teams that routinely reproduce experiments from external sources.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H References
- hiddenlayer.com/sai-security-advisory/mlflow-june2024 Exploit 3rd Party
Timeline
Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert