Rhoai Odh-Mlflow-Rhel9 vulnerabilities

7 known vulnerabilities affecting rhoai/odh-mlflow-rhel9.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH1MEDIUM3LOW1

Vulnerabilities

Page 1 of 1
CVE-2026-42208CRITICALCVSS 9.82026-04-28
CVE-2026-42208 [CRITICAL] CWE-89 LiteLLM: LiteLLM: Unauthorized data access and modification via SQL injection LiteLLM: LiteLLM: Unauthorized data access and modification via SQL injection A flaw was found in LiteLLM. A database query used for proxy API key checks incorrectly incorporated caller-supplied key values directly into the query. This vulnerability allows an unauthenticated attacker to send a specially crafted Authorization header to any Large Language Model (LLM) API route, exploitin
redhat
CVE-2026-41305MEDIUMCVSS 6.12026-04-24
CVE-2026-41305 [MEDIUM] CWE-79 postcss: PostCSS: Cross-Site Scripting (XSS) via improper escaping of style closing tags postcss: PostCSS: Cross-Site Scripting (XSS) via improper escaping of style closing tags A flaw was found in PostCSS. This vulnerability allows a remote attacker to perform Cross-Site Scripting (XSS) by submitting specially crafted CSS. When PostCSS processes and re-stringifies this CSS for embedding within HTML `` tags, it fails to properly escape `` sequences. This oversight
redhat
CVE-2026-41205HIGHCVSS 7.72026-04-23
CVE-2026-41205 [HIGH] CWE-22 mako: python: Mako: Information disclosure via path traversal vulnerability mako: python: Mako: Information disclosure via path traversal vulnerability A flaw was found in Mako, a Python template library. This vulnerability, known as path traversal, allows an attacker to access files outside of the intended directory. By providing a specially crafted input to the TemplateLookup.get_template() function, a remote attacker can exploit an inconsistency in how the system
redhat
CVE-2026-41988LOWCVSS 3.22026-04-23
CVE-2026-41988 [LOW] CWE-787 uuid: uuid: Unexpected data writes when using external output buffers with specific UUID versions uuid: uuid: Unexpected data writes when using external output buffers with specific UUID versions A flaw was found in uuid. When external output buffers are used with UUID versions 3, 5, or 6, an attacker with local access may be able to cause unexpected data writes. This vulnerability could lead to low impact data integrity issues. UUID version 4 is not affected. Pack
redhat
CVE-2026-40895MEDIUMCVSS 6.92026-04-21
CVE-2026-40895 [MEDIUM] CWE-212 follow-redirects: follow-redirects: Information disclosure via cross-domain redirects follow-redirects: follow-redirects: Information disclosure via cross-domain redirects A flaw was found in follow-redirects. When an HTTP request follows a cross-domain redirect (a redirection to a different domain), custom authentication headers, such as X-API-Key or X-Auth-Token, are not properly stripped. This allows these sensitive headers to be forwarded verbatim to the redi
redhat
CVE-2026-28684MEDIUMCVSS 6.62026-04-20
CVE-2026-28684 [MEDIUM] CWE-59 python-dotenv: python-dotenv: Arbitrary file overwrite via symbolic link following python-dotenv: python-dotenv: Arbitrary file overwrite via symbolic link following A flaw was found in python-dotenv. A local attacker can exploit this by crafting a symbolic link, which the `set_key()` and `unset_key()` functions in python-dotenv follow when rewriting `.env` files. This can lead to the overwriting of arbitrary files on the system. Mitigation: Mitigation for this i
redhat
CVE-2026-41242CRITICALCVSS 9.42026-04-18
CVE-2026-41242 [CRITICAL] CWE-94 protobufjs: protobufjs: Arbitrary code execution via injected protobuf definition type fields protobufjs: protobufjs: Arbitrary code execution via injected protobuf definition type fields A flaw was found in protobufjs, a JavaScript (JS) library used for compiling protobuf definitions. A remote attacker with low privileges can exploit this vulnerability by injecting arbitrary code into the "type" fields of protobuf definitions. This malicious code will then exec
redhat