with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
{ "cpes": [ "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*" ], "severity": "High" }