with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
{ "severity": "High", "cpes": [ "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*" ] }