Generated remediation guidance and an executive summary. No account required.
In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to read trace information and create assessments for traces they should not have access to. This vulnerability impacts confidentiality by exposing trace metadata and integrity by allowing unauthorized creation of assessments. Deployments using `mlflow server --app-name=basic-auth` are affected.
Cite this page
CVE-2025-15381. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-15381
Use CWE-200, Lfprojects vendor hub and Mlflow product page to widen CVE-2025-15381 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-15036, CVE-2026-0545 and CVE-2025-15379 for nearby disclosures in the same product family.