Home » Database

AVID-2026-R1335

Description

Command Injection (CVE-2023-6940)

Details

with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.

Reason for inclusion in AVID: This CVE describes a command injection vulnerability in MLflow allowing remote code execution with minimal user interaction. MLflow is a software component used to build, train, package, deploy, and serve AI/ML pipelines. Exploitation would affect the AI software stack, i.e., the general-purpose AI system supply chain. It is a software vulnerability (RCE) in a core AI workflow component (mlflow), not hardware/firmware. The report provides explicit evidence (CVE ID, description, affected artifacts, references).

References

Affected or Relevant Artifacts

  • Developer: mlflow
  • Deployer: mlflow
  • Artifact Details:
TypeName
Systemmlflow/mlflow

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Base Score9.0
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionREQUIRED
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-77CWE-77 Improper Neutralization of Special Elements used in a Command (‘Command Injection’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2023-12-19
  • Version: 0.3.3
  • AVID Entry