Description

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during `bentoml containerize` / `docker build`. Version 1.4.37 fixes the issue.

INFO

Published Date :

2026-03-27T00:45:08.108Z

Last Modified :

2026-03-27T00:45:08.108Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33744 vulnerability.

Vendors Products
Bentoml
  • Bentoml
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33744.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact