First published: Thu Mar 20 2025(Updated: )
In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. An attacker can create large batches of queries that repeatedly request all runs from a given experiment. This can tie up all the workers allocated by MLFlow, rendering the application unable to respond to other requests. This vulnerability is due to uncontrolled resource consumption.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
MLflow | ||
pip/mlflow | <=2.17.2 | |
MLflow | =2.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0453 has a high severity due to its potential for a denial of service attack.
To fix CVE-2025-0453, upgrade to a patched version of MLflow that addresses this vulnerability.
CVE-2025-0453 affects MLflow version 2.17.2 and potentially earlier versions.
CVE-2025-0453 allows attackers to exploit the `/graphql` endpoint by submitting large batches of queries.
CVE-2025-0453 can tie up all workers within MLflow, leading to service unavailability.