{"id":"CVE-2024-37058","details":"Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.5.0 or newer, enabling a maliciously uploaded Langchain AgentExecutor model to run arbitrary code on an end user’s system when interacted with.","aliases":["BIT-mlflow-2024-37058","GHSA-cwgg-w6mp-w9hg"],"modified":"2026-03-14T12:34:18.245992Z","published":"2024-06-04T12:15:12.023Z","references":[{"type":"EVIDENCE","url":"https://hiddenlayer.com/sai-security-advisory/mlflow-june2024"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-37058.json","unresolved_ranges":[{"events":[{"introduced":"2.5.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}