First published: Thu Mar 20 2025(Updated: )
In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be susceptible to unauthorized access. Additionally, this issue violates best practices for secure user account management. The issue is fixed in version 2.19.0.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
MLflow | ||
MLflow | <2.19.0 | |
pip/mlflow | <2.19.0 | 2.19.0 |
MLflow | <2.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1474 has a significant severity level due to the risk of unauthorized access from accounts created without passwords.
To fix CVE-2025-1474, ensure that all user accounts are created with strong passwords in MLflow version 2.18 or earlier by upgrading to a secure version.
CVE-2025-1474 affects MLflow version 2.18 and earlier releases.
The potential risks include unauthorized account access and violation of security best practices due to accounts without passwords.
Yes, an attacker can easily exploit CVE-2025-1474 by accessing accounts with no password protection.