MLflow Weak Password Requirements Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of passwords. The issue results from weak password requirements. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26916.
References
| Link | Resource |
|---|---|
| https://github.com/mlflow/mlflow/commit/1f74f3f24d8273927b8db392c23e108576936c54 | Patch |
| https://www.zerodayinitiative.com/advisories/ZDI-25-932/ | Third Party Advisory |
Configurations
History
04 Nov 2025, 21:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/mlflow/mlflow/commit/1f74f3f24d8273927b8db392c23e108576936c54 - Patch | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-25-932/ - Third Party Advisory | |
| CPE | cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Lfprojects mlflow
Lfprojects |
Information
Published : 2025-10-29 20:15
Updated : 2025-11-04 21:18
NVD link : CVE-2025-11200
Mitre link : CVE-2025-11200
CVE.ORG link : CVE-2025-11200
JSON object : View
Products Affected
lfprojects
- mlflow
CWE
CWE-521
Weak Password Requirements
