VYPR
High severity7.8NVD Advisory· Published Mar 27, 2026· Updated Apr 1, 2026

CVE-2026-33744

CVE-2026-33744

Description

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the docker.system_packages field in bentofile.yaml accepts arbitrary strings that are interpolated directly into Dockerfile RUN commands without sanitization. Since system_packages is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious bentofile.yaml achieves arbitrary command execution during bentoml containerize / docker build. Version 1.4.37 fixes the issue.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
bentomlPyPI
< 1.4.371.4.37

Affected products

1
  • cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:*
    Range: <1.4.37

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.