High severity7.8NVD Advisory· Published Mar 27, 2026· Updated Apr 1, 2026
CVE-2026-33744
CVE-2026-33744
Description
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the docker.system_packages field in bentofile.yaml accepts arbitrary strings that are interpolated directly into Dockerfile RUN commands without sanitization. Since system_packages is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious bentofile.yaml achieves arbitrary command execution during bentoml containerize / docker build. Version 1.4.37 fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
bentomlPyPI | < 1.4.37 | 1.4.37 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/bentoml/BentoML/security/advisories/GHSA-jfjg-vc52-wqvfnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-jfjg-vc52-wqvfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33744ghsaADVISORY
News mentions
0No linked articles in our index yet.