Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23049 | BentoML SSRF Vulnerability in File Upload Processing |
Github GHSA |
GHSA-mrmq-3q62-6cc8 | BentoML SSRF Vulnerability in File Upload Processing |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 05 Aug 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:* |
Wed, 30 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 30 Jul 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bentoml
Bentoml bentoml |
|
| Vendors & Products |
Bentoml
Bentoml bentoml |
Tue, 29 Jul 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BentoML is a Python library for building online serving systems optimized for AI apps and model inference. In versions 1.4.0 until 1.4.19, the file upload processing system contains an SSRF vulnerability that allows unauthenticated remote attackers to force the server to make arbitrary HTTP requests. The vulnerability stems from the multipart form data and JSON request handlers, which automatically download files from user-provided URLs without validating whether those URLs point to internal network addresses, cloud metadata endpoints, or other restricted resources. The documentation explicitly promotes this URL-based file upload feature, making it an intended design that exposes all deployed services to SSRF attacks by default. Version 1.4.19 contains a patch for the issue. | |
| Title | BentoML is Vulnerable to an SSRF Attack Through File Upload Processing | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-30T15:07:10.836Z
Reserved: 2025-07-21T16:12:20.733Z
Link: CVE-2025-54381
Updated: 2025-07-30T13:32:11.256Z
Status : Analyzed
Published: 2025-07-29T23:15:32.947
Modified: 2025-08-05T15:41:26.900
Link: CVE-2025-54381
No data.
OpenCVE Enrichment
Updated: 2025-07-30T06:15:17Z
EUVD
Github GHSA