VYPR
High severity8.8NVD Advisory· Published Apr 6, 2026· Updated Apr 10, 2026

CVE-2026-35044

CVE-2026-35044

Description

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandboxed jinja2.Environment with the jinja2.ext.do extension to render user-provided dockerfile_template files. When a victim imports a malicious bento archive and runs bentoml containerize, attacker-controlled Jinja2 template code executes arbitrary Python directly on the host machine, bypassing all container isolation. This vulnerability is fixed in 1.4.38.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
bentomlPyPI
< 1.4.381.4.38

Affected products

1
  • cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:*
    Range: <1.4.38

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.