Description
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during `bentoml containerize` / `docker build`. Version 1.4.37 fixes the issue.
Published: 2026-03-27
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Dockerfile command injection during containerization
Action: Patch immediately
AI Analysis

Impact

BentoML versions prior to 1.4.37 allow arbitrary strings supplied in the system_packages field of bentofile.yaml to be interpolated directly into Dockerfile RUN commands without any sanitization. This flaw is a form of command injection that lets an attacker execute whichever shell commands they embed when they run bentoml containerize or the subsequent docker build. The result is that the attacker can add malicious binaries, modify the image contents, or otherwise compromise the build process, potentially leading to full control over the image that will later run in production environments.

Affected Systems

The vulnerability affects the BentoML library when the system_packages field is enabled in bentofile.yaml in every build from any version earlier than 1.4.37. Users of BentoML 1.4.36 and earlier are impacted. The issue was corrected in version 1.4.37, so any release 1.4.37 or later is not vulnerable.

Risk and Exploitability

With a CVSS score of 7.8 the flaw is classified as high severity. The exploit requires the attacker to control or supply the bentofile.yaml used during image creation, which is typically a local privilege or supply chain situation. Because the flaw allows arbitrary code to run in the build environment, it can lead to container breakouts if the build host is not isolated, and any container built from a compromised image inherits the attacker’s code. No EPSS data is available, and the vulnerability is not currently listed in the CISA KEV catalog, but the high CVSS score and ability to fully compromise the image make the risk significant for organizations that rely on BentoML for production deployments.

Generated by OpenCVE AI on March 27, 2026 at 06:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade BentoML to version 1.4.37 or later.
  • Verify bentofile.yaml content for unexpected shell commands before running containerize.
  • If upgrading is not yet possible, manually sanitize or remove the system_packages field or ensure it contains only trusted package names.
  • Implement process isolation so that the docker build runs in a restricted, non‑privileged environment.

Generated by OpenCVE AI on March 27, 2026 at 06:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jfjg-vc52-wqvf BentoML has Dockerfile Command Injection via system_packages in bentofile.yaml
History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Bentoml
Bentoml bentoml
Vendors & Products Bentoml
Bentoml bentoml

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during `bentoml containerize` / `docker build`. Version 1.4.37 fixes the issue.
Title BentoML has Dockerfile Command Injection via system_packages in bentofile.yaml
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T00:45:08.108Z

Reserved: 2026-03-23T17:34:57.562Z

Link: CVE-2026-33744

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T01:16:21.007

Modified: 2026-03-27T01:16:21.007

Link: CVE-2026-33744

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:28Z

Weaknesses