BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bentoml
Bentoml bentoml |
|
CPEs | cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:* | |
Vendors & Products |
Bentoml
Bentoml bentoml |
Wed, 09 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 09 Apr 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8. | |
Title | Insecure Deserialization leads to RCE in BentoML's runner server | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-04-09T15:30:03.842Z
Updated: 2025-04-09T15:40:52.656Z
Reserved: 2025-04-06T19:46:02.461Z
Link: CVE-2025-32375

Updated: 2025-04-09T15:40:41.835Z

Status : Analyzed
Published: 2025-04-09T16:15:25.580
Modified: 2025-04-22T16:52:36.937
Link: CVE-2025-32375

No data.