Description
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to version 1.4.34, BentoML's `bentofile.yaml` configuration allows path traversal attacks through multiple file path fields (`description`, `docker.setup_script`, `docker.dockerfile_template`, `conda.environment_yml`). An attacker can craft a malicious bentofile that, when built by a victim, exfiltrates arbitrary files from the filesystem into the bento archive. This enables supply chain attacks where sensitive files (SSH keys, credentials, environment variables) are silently embedded in bentos and exposed when pushed to registries or deployed. Version 1.4.34 contains a patch for the issue.
Published: 2026-01-26
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data exfiltration via path traversal
Action: Apply patch
AI Analysis

Impact

BentoML previously allowed users to specify several file path fields in its bentofile.yaml configuration, including description, docker.setup_script, docker.dockerfile_template, and conda.environment_yml. By inserting specially crafted paths, an attacker can cause the build process to read arbitrary files from the host file system and embed them into the resulting bento archive. This leads to hidden exfiltration of sensitive material such as SSH keys, credentials, or environment variables, and can silently inject malicious content into artifacts that are later pushed to registries or deployed in production. The vulnerability is a classic path traversal flaw (CWE‑22) that compromises confidentiality and supply‑chain integrity. The impact is not limited to local files; any file the build process can read may be extracted, potentially exposing critical secrets.

Affected Systems

The issue affects BentoML installations using the bentoml Python library prior to version 1.4.34. The relevant product is BentoML, and the vulnerable releases are all versions before v1.4.34. Updating to the patched release eliminates the vulnerability.

Risk and Exploitability

The CVSS score of 7.4 denotes high severity, while the EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, suggesting no known exploitation campaigns. Attackers would need to supply a malicious bentofile.yaml to the build process, typically through supply‑chain contamination or a malicious user initiating a build. Once a victim builds the artifact, the path traversal is fully executed, reading arbitrary files into the archive, which can later propagate sensitive data when the artifact is pushed to a registry or deployed. Overall, the risk is significant for systems that build bentos from untrusted sources, but the probability of a real‑world attack remains low at present.

Generated by OpenCVE AI on April 18, 2026 at 14:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade BentoML to version 1.4.34 or later, which contains a patch that sanitizes file path inputs.
  • Limit the build process to trusted or signed bentofile.yaml sources and validate file paths prior to initiating a build.
  • Implement CI/CD checks or artifact scanning to detect unexpected embedded files in produced bentos before publishing to registries.

Generated by OpenCVE AI on April 18, 2026 at 14:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6r62-w2q3-48hf BentoML has a Path Traversal via Bentofile Configuration
History

Tue, 03 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:*

Tue, 27 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Bentoml
Bentoml bentoml
Vendors & Products Bentoml
Bentoml bentoml

Mon, 26 Jan 2026 22:30:00 +0000

Type Values Removed Values Added
Description BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to version 1.4.34, BentoML's `bentofile.yaml` configuration allows path traversal attacks through multiple file path fields (`description`, `docker.setup_script`, `docker.dockerfile_template`, `conda.environment_yml`). An attacker can craft a malicious bentofile that, when built by a victim, exfiltrates arbitrary files from the filesystem into the bento archive. This enables supply chain attacks where sensitive files (SSH keys, credentials, environment variables) are silently embedded in bentos and exposed when pushed to registries or deployed. Version 1.4.34 contains a patch for the issue.
Title BentoML has a Path Traversal via Bentofile Configuration
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T21:37:03.727Z

Reserved: 2026-01-21T18:38:22.473Z

Link: CVE-2026-24123

cve-icon Vulnrichment

Updated: 2026-01-27T21:36:59.309Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T23:16:08.460

Modified: 2026-02-03T15:07:55.700

Link: CVE-2026-24123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:00:03Z

Weaknesses