CVE-2024-27132
NixOS vulnerability analysis and mitigation

Overview

CVE-2024-27132 is a security vulnerability discovered in MLflow, affecting versions up to and including 2.9.2. The vulnerability was identified as an insufficient sanitization issue that leads to Cross-Site Scripting (XSS) when running an untrusted recipe in MLflow. The issue was discovered by JFrog Security Research Team and was publicly disclosed on February 23, 2024 (JFrog Advisory).

Technical details

The vulnerability stems from lack of sanitization over template variables in MLflow. When running an untrusted recipe in a Jupyter Notebook environment, this vulnerability can lead to client-side Remote Code Execution (RCE). The issue has been assigned a CVSS v3.1 base score of 7.5 (High) by JFrog and 9.6 (Critical) by NIST, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H (NVD).

Impact

The vulnerability can allow attackers to achieve client-side Remote Code Execution (RCE) when running untrusted recipes in Jupyter Notebook. This could potentially enable attackers to perform extensive lateral movement within an organization, as ML clients typically have access to important ML services such as ML Model Registries or MLOps Pipelines (Hacker News).

Mitigation and workarounds

The vulnerability has been patched in MLflow through a fix that was merged via GitHub pull request #10873. Organizations should upgrade to a version newer than 2.9.2 to protect against this vulnerability (GitHub PR).

Community reactions

The security community has highlighted this vulnerability as part of a broader collection of 22 security shortcomings in open-source machine learning tools and frameworks. Security researchers emphasize the importance of treating all XSS vulnerabilities in ML libraries as potential arbitrary code execution risks, particularly when used with Jupyter Notebook (Hacker News).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-69264CRITICAL9.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69263HIGH8.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69262HIGH7.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2026-21885MEDIUM6.5
  • NixOSNixOS
  • miniflux
NoYesJan 08, 2026
CVE-2026-22184MEDIUM4.6
  • NixOSNixOS
  • java-1.8.0-openjdk-demo
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management