Metrics
Affected Vendors & Products
Thu, 21 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 21 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mlflow
Mlflow mlflow/mlflow |
|
| Vendors & Products |
Mlflow
Mlflow mlflow/mlflow |
Thu, 21 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In mlflow/mlflow versions up to 3.9.0, the `SearchModelVersions` REST API endpoint and the `mlflowSearchModelVersions` GraphQL query lack proper per-model authorization checks when basic authentication is enabled. This allows any authenticated user to enumerate all model versions across all registered models, regardless of their permission level. The issue arises due to the absence of `SearchModelVersions` in the `BEFORE_REQUEST_VALIDATORS` and `AFTER_REQUEST_HANDLERS` for the REST API, and its omission from `GraphQLAuthorizationMiddleware.PROTECTED_FIELDS` for GraphQL. This vulnerability can expose sensitive information such as model names, version descriptions, source URIs, tags, and other metadata, potentially revealing proprietary or confidential details in multi-tenant environments. The issue is resolved in version 3.10.0. | |
| Title | Authorization Bypass in SearchModelVersions in mlflow/mlflow | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-05-21T12:40:09.114Z
Reserved: 2026-02-19T07:17:33.358Z
Link: CVE-2026-2734
Updated: 2026-05-21T12:39:59.710Z
Status : Received
Published: 2026-05-21T05:16:22.723
Modified: 2026-05-21T14:16:44.737
Link: CVE-2026-2734
OpenCVE Enrichment
Updated: 2026-05-21T13:30:11Z