CVSS 3.1 Score 7.5 of 10 (high)


Published Dec 5, 2023
Updated: Dec 11, 2023


CVE-2023-43472 is a vulnerability found in MLFlow versions 2.8.1 and earlier, allowing a remote attacker to obtain sensitive information through a crafted request to the REST API. This vulnerability has a high severity rating and poses a potential danger to organizations, as it can lead to unauthorized access and exposure of sensitive data. The affected products include qiibyT, qiibyX, qiibyW, qiibyV, qiibyU, qiibyb, qiibya, qiibyZ, and many more. To remediate this vulnerability, organizations should update their MLFlow software to version 2.8.2 or later, which includes the necessary fixes to address this issue.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-43472 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options