Generated remediation guidance and an executive summary. No account required.
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks.
Cite this page
CVE-2024-2928. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2024-2928
Use CWE-29, Lfprojects vendor hub and Mlflow product page to widen CVE-2024-2928 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-15036, CVE-2026-0545 and CVE-2025-15379 for nearby disclosures in the same product family.