PyPi: Zenml

CVE-2024-4311

Safety vulnerability ID: 74260

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 14, 2024 Updated at Oct 24, 2025
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of zenml-io/zenml before are vulnerable to Open Redirection (CWE-601). This vulnerability allows attackers to redirect users to malicious sites by manipulating the next parameter in the login functionality. The impact includes phishing attacks and unauthorized access to sensitive resources. The attack vector involves crafting requests with malicious next parameters to the /api/v1/current-user endpoint. Vulnerable functions include login in app_blueprint.py and get_redirect_url in helpers.py. To mitigate, upgrade to zenml-io/zenml the version which implements proper validation and handling of redirect URLs, preventing unauthorized redirections.

Affected package

zenml

Latest version: 0.91.0

ZenML: MLOps for Reliable AI: from Classical AI to Agents.

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.4

CVSS v3 Details

MEDIUM 5.4
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
HIGH
Privileges Required (PR)
LOW
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH