Bentoml

4 CVEs product

Monthly

CVE-2026-27905 HIGH POC PATCH This Week

Arbitrary file write in BentoML prior to version 1.4.36 allows local attackers to write files to arbitrary locations on the host system by crafting malicious tar archives containing symlinks that point outside the extraction directory. The vulnerability exists because the safe_extract_tarfile() function fails to validate symlink targets, only validating the symlink path itself, enabling attackers to bypass directory traversal protections. Public exploit code exists for this vulnerability; users should upgrade to version 1.4.36 or later.

Python AI / ML Bentoml
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-24123 HIGH PATCH This Week

BentoML versions prior to 1.4.34 allow path traversal attacks through improperly validated file path fields in bentofile.yaml configurations, enabling attackers to embed arbitrary files from the victim's system into bento archives during the build process. This vulnerability can be exploited to exfiltrate sensitive data such as credentials, SSH keys, and environment variables into supply chain artifacts that may be pushed to registries or deployed in production environments. A patch is available in version 1.4.34.

Python Docker Path Traversal AI / ML Bentoml
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2025-32375 CRITICAL POC PATCH THREAT Act Now

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 67.3%.

Python Information Disclosure RCE Deserialization Bentoml
NVD GitHub
CVSS 3.1
9.8
EPSS
67.3%
CVE-2025-27520 CRITICAL POC PATCH THREAT Act Now

BentoML version 1.4.2 and earlier contains an unauthenticated remote code execution vulnerability through insecure deserialization. The serving endpoint accepts pickled Python objects that are deserialized without validation, allowing attackers to execute arbitrary code on any BentoML inference server.

Python RCE Deserialization Bentoml
NVD GitHub
CVSS 3.1
9.8
EPSS
87.3%
CVE-2026-27905
EPSS 0% CVSS 7.8
HIGH POC PATCH This Week

Arbitrary file write in BentoML prior to version 1.4.36 allows local attackers to write files to arbitrary locations on the host system by crafting malicious tar archives containing symlinks that point outside the extraction directory. The vulnerability exists because the safe_extract_tarfile() function fails to validate symlink targets, only validating the symlink path itself, enabling attackers to bypass directory traversal protections. Public exploit code exists for this vulnerability; users should upgrade to version 1.4.36 or later.

Python AI / ML Bentoml
NVD GitHub
CVE-2026-24123
EPSS 0% CVSS 7.4
HIGH PATCH This Week

BentoML versions prior to 1.4.34 allow path traversal attacks through improperly validated file path fields in bentofile.yaml configurations, enabling attackers to embed arbitrary files from the victim's system into bento archives during the build process. This vulnerability can be exploited to exfiltrate sensitive data such as credentials, SSH keys, and environment variables into supply chain artifacts that may be pushed to registries or deployed in production environments. A patch is available in version 1.4.34.

Python Docker Path Traversal +2
NVD GitHub
CVE-2025-32375
EPSS 67% CVSS 9.8
CRITICAL POC PATCH THREAT Act Now

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 67.3%.

Python Information Disclosure RCE +2
NVD GitHub
CVE-2025-27520
EPSS 87% CVSS 9.8
CRITICAL POC PATCH THREAT Act Now

BentoML version 1.4.2 and earlier contains an unauthenticated remote code execution vulnerability through insecure deserialization. The serving endpoint accepts pickled Python objects that are deserialized without validation, allowing attackers to execute arbitrary code on any BentoML inference server.

Python RCE Deserialization +1
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy