Description

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandboxed jinja2.Environment with the jinja2.ext.do extension to render user-provided dockerfile_template files. When a victim imports a malicious bento archive and runs bentoml containerize, attacker-controlled Jinja2 template code executes arbitrary Python directly on the host machine, bypassing all container isolation. This vulnerability is fixed in 1.4.38.

INFO

Published Date :

2026-04-06T17:13:43.133Z

Last Modified :

2026-04-06T18:49:59.815Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-35044 vulnerability.

Vendors Products
Bentoml
  • Bentoml
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35044.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact