Cyber Posture

CVE-2026-0545

CriticalPublic PoCUpdated

Published: 03 April 2026

Published
03 April 2026
Modified
21 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1148 93.7th percentile
Risk Priority 26 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0545 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Lfprojects Mlflow. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 6.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-14 requires defining and restricting actions performable without identification or authentication, directly preventing unauthenticated access to vulnerable MLflow job endpoints.

prevent

AC-3 enforces approved authorizations for logical access, ensuring FastAPI job endpoints under /ajax-api/3.0/jobs/* require authentication despite basic-auth configuration.

prevent

IA-2 mandates identification and authentication for organizational users, mitigating the authentication bypass allowing unauthorized job submission, reading, searching, and cancellation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Authentication bypass in public-facing MLflow web application (T1190) enables unauthorized job submission, management, and potential RCE/DoS via job spam (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is enabled (`MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true`) and any job function…

more

is allowlisted, any network client can submit, read, search, and cancel jobs without credentials, bypassing basic-auth entirely. This can lead to unauthenticated remote code execution if allowed jobs perform privileged actions such as shell execution or filesystem changes. Even if jobs are deemed safe, this still constitutes an authentication bypass, potentially resulting in job spam, denial of service (DoS), or data exposure in job results.

Deeper analysisAI

CVE-2026-0545 is a critical authentication bypass vulnerability (CVSS 9.8, CWE-306) in mlflow/mlflow, affecting the latest version of the repository. The FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled, allowing unauthorized access despite basic-auth configuration.

Any network client can exploit this vulnerability without privileges if job execution is enabled (`MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true`) and any job function is allowlisted. Attackers can submit, read, search, and cancel jobs without credentials, fully bypassing basic-auth. This may enable unauthenticated remote code execution if allowlisted jobs perform privileged actions like shell execution or filesystem changes; otherwise, it still permits job spam, denial of service (DoS), or exposure of data in job results.

Mitigation details are available in the Huntr.com bounty advisory at https://huntr.com/bounties/b2e5b028-9541-4d29-8703-a76f1a3734d8.

Mlflow manages end-to-end machine learning lifecycles, making this vulnerability particularly relevant to AI/ML infrastructure deployments. No real-world exploitation has been reported.

Details

CWE(s)

Affected Products

lfprojects
mlflow
all versions

CVEs Like This One

CVE-2025-11200Same product: Lfprojects Mlflow
CVE-2025-11201Same product: Lfprojects Mlflow
CVE-2025-15031Same product: Lfprojects Mlflow
CVE-2026-0596Same product: Lfprojects Mlflow
CVE-2025-14287Same product: Lfprojects Mlflow
CVE-2025-1473Same product: Lfprojects Mlflow
CVE-2025-0453Same product: Lfprojects Mlflow
CVE-2024-8859Same product: Lfprojects Mlflow
CVE-2026-21863Same vendor: Lfprojects
CVE-2026-21864Same vendor: Lfprojects

References