BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version (v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server. It exists an unsafe code segment in serde.py. This vulnerability is fixed in 1.4.3.
References
Link | Resource |
---|---|
https://github.com/bentoml/BentoML/commit/b35f4f4fcc53a8c3fe8ed9c18a013fe0a728e194 | Patch |
https://github.com/bentoml/BentoML/security/advisories/GHSA-33xw-247w-6hmc | Exploit Third Party Advisory |
https://github.com/bentoml/BentoML/security/advisories/GHSA-33xw-247w-6hmc | Exploit Third Party Advisory |
Configurations
History
27 Jun 2025, 12:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Bentoml
Bentoml bentoml |
|
CPE | cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:* | |
References | () https://github.com/bentoml/BentoML/commit/b35f4f4fcc53a8c3fe8ed9c18a013fe0a728e194 - Patch | |
References | () https://github.com/bentoml/BentoML/security/advisories/GHSA-33xw-247w-6hmc - Exploit, Third Party Advisory |
07 Apr 2025, 14:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Apr 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-04 15:15
Updated : 2025-06-27 12:48
NVD link : CVE-2025-27520
Mitre link : CVE-2025-27520
CVE.ORG link : CVE-2025-27520
JSON object : View
Products Affected
bentoml
- bentoml
CWE
CWE-502
Deserialization of Untrusted Data