Description
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandboxed jinja2.Environment with the jinja2.ext.do extension to render user-provided dockerfile_template files. When a victim imports a malicious bento archive and runs bentoml containerize, attacker-controlled Jinja2 template code executes arbitrary Python directly on the host machine, bypassing all container isolation. This vulnerability is fixed in 1.4.38.
INFO
Published Date :
2026-04-06T17:13:43.133Z
Last Modified :
2026-04-06T18:49:59.815Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-35044 vulnerability.
| Vendors | Products |
|---|---|
| Bentoml |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35044.