Description
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during `bentoml containerize` / `docker build`. Version 1.4.37 fixes the issue.
INFO
Published Date :
2026-03-27T00:45:08.108Z
Last Modified :
2026-03-27T00:45:08.108Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33744 vulnerability.
| Vendors | Products |
|---|---|
| Bentoml |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33744.