Generated remediation guidance and an executive summary. No account required.
MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. An attacker can query, update, and delete experiments via the affected endpoints, leading to potential data exfiltration, destruction, or manipulation. The issue is resolved in version 3.5.0.
Cite this page
CVE-2025-14279. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-14279
Use CWE-346, Lfprojects vendor hub and Mlflow product page to widen CVE-2025-14279 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-15036, CVE-2026-0545 and CVE-2025-15379 for nearby disclosures in the same product family.