VYPR
Medium severity5.4NVD Advisory· Published Apr 7, 2026· Updated Apr 20, 2026

CVE-2026-33865

CVE-2026-33865

Description

MLflow is vulnerable to Stored Cross-Site Scripting (XSS) caused by unsafe parsing of YAML-based MLmodel artifacts in its web interface. An authenticated attacker can upload a malicious MLmodel file containing a payload that executes when another user views the artifact in the UI. This allows actions such as session hijacking or performing operations on behalf of the victim.

This issue affects MLflow version through 3.10.1

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
mlflowPyPI
< 3.11.13.11.1

Affected products

1

Patches

1
aca4dd0ec88a

Fix stored XSS via unsafe YAML parsing of MLmodel artifacts (#21435)

https://github.com/mlflow/mlflowHarutaka KawamuraMar 6, 2026via ghsa
2 files changed · +2 2
  • mlflow/server/js/src/experiment-tracking/components/artifact-view-components/ShowArtifactLoggedModelView.tsx+1 1 modified
    @@ -447,7 +447,7 @@ mlflow.models.predict(
           getArtifact,
         )
           .then((response: any) => {
    -        const parsedJson = yaml.load(response);
    +        const parsedJson = yaml.safeLoad(response);
             if (parsedJson.signature) {
               const inputs = Array.isArray(parsedJson.signature.inputs)
                 ? parsedJson.signature.inputs
    
  • mlflow/server/js/src/experiment-tracking/components/experiment-logged-models/hooks/useValidateLoggedModelSignature.ts+1 1 modified
    @@ -14,7 +14,7 @@ export const useValidateLoggedModelSignature = (loggedModel?: LoggedModelProto |
         const artifactLocation = getLoggedModelArtifactLocationUrl(MLMODEL_FILE_NAME, loggedModel.info.model_id);
         const blob = await getArtifactBlob(artifactLocation);
     
    -    const yamlContent = (await lazyJsYaml()).load(await blob.text());
    +    const yamlContent = (await lazyJsYaml()).safeLoad(await blob.text());
     
         const isValid = yamlContent?.signature?.inputs !== undefined && yamlContent?.signature?.outputs !== undefined;
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.