Description
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line 1648 interpolates system_packages directly into a shell command using an f-string without any quoting. The generated script is uploaded to BentoCloud as setup.sh and executed on the cloud build infrastructure during deployment, making this a remote code execution on the CI/CD tier. This vulnerability is fixed in 1.4.38.
Published: 2026-04-06
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

BentoML’s cloud deployment path was vulnerable to command injection due to an unsanitized f-string that interpolated system_packages directly into a shell command. The resulting setup script is uploaded to BentoCloud and executed on the build infrastructure, allowing an attacker to run arbitrary commands. This flaw can lead to complete compromise of the cloud deployment environment, affecting confidentiality, integrity, and availability of the deployed service.

Affected Systems

The vulnerability affects the BentoML Python library, specifically versions earlier than 1.4.38. Users deploying models to BentoCloud using the affected deployment.py script are at risk.

Risk and Exploitability

With a CVSS score of 7.8, the severity is high. The EPSS score of less than 1% indicates a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. An attacker would need to submit a deployment to BentoCloud that triggers the vulnerable script; no local privilege escalation or network compromise is required, as the attack vector is the CI/CD tier of BentoCloud. The exploit is straightforward once a deployment is created, with no complex prerequisite conditions cited in the advisory.

Generated by OpenCVE AI on April 10, 2026 at 20:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade BentoML to version 1.4.38 or later, which removes the vulnerable f-string usage.
  • If immediate upgrade is not possible, avoid using BentoCloud for deployments that rely on the old deployment.py path until a patch is applied.
  • Monitor the deployment logs for unexpected setup script modifications and enforce a policy to reject any upload of privileged commands.

Generated by OpenCVE AI on April 10, 2026 at 20:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fgv4-6jr3-jgfw BentoML: Command Injection in cloud deployment setup script
History

Fri, 10 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:*

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Bentoml
Bentoml bentoml
Vendors & Products Bentoml
Bentoml bentoml

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line 1648 interpolates system_packages directly into a shell command using an f-string without any quoting. The generated script is uploaded to BentoCloud as setup.sh and executed on the cloud build infrastructure during deployment, making this a remote code execution on the CI/CD tier. This vulnerability is fixed in 1.4.38.
Title BentoML: command injection in cloud deployment setup script (deployment.py)
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T14:09:07.570Z

Reserved: 2026-03-31T21:06:06.428Z

Link: CVE-2026-35043

cve-icon Vulnrichment

Updated: 2026-04-07T14:08:57.594Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T18:16:41.823

Modified: 2026-04-10T18:54:17.160

Link: CVE-2026-35043

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:27:43Z

Weaknesses