Generated remediation guidance and an executive summary. No account required.
A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct interpolation of user-supplied container image names into shell commands without proper sanitization, which are then executed using `os.system()`. This allows attackers to execute arbitrary commands by supplying malicious input through the `--container` parameter of the CLI. The issue affects environments where MLflow is used, including development setups, CI/CD pipelines, and cloud deployments.
Cite this page
CVE-2025-14287. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-14287
Use CWE-94, Lfprojects vendor hub and Mlflow product page to widen CVE-2025-14287 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-15036, CVE-2026-0545 and CVE-2025-15379 for nearby disclosures in the same product family.