Generated remediation guidance and an executive summary. No account required.
A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. When users configure and use the dbfs service, concatenating the URL directly into the file protocol results in an arbitrary file read vulnerability. This issue occurs because only the path part of the URL is checked, while parts such as query and parameters are not handled. The vulnerability is triggered if the user has configured the dbfs service, and during usage, the service is mounted to a local directory.
Cite this page
CVE-2024-8859. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2024-8859
Use CWE-29, Lfprojects vendor hub and Mlflow product page to widen CVE-2024-8859 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-15036, CVE-2026-0545 and CVE-2025-15379 for nearby disclosures in the same product family.