CVE-2026-24123
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-26

Last updated on: 2026-02-03

Assigner: GitHub, Inc.

Description
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to version 1.4.34, BentoML's `bentofile.yaml` configuration allows path traversal attacks through multiple file path fields (`description`, `docker.setup_script`, `docker.dockerfile_template`, `conda.environment_yml`). An attacker can craft a malicious bentofile that, when built by a victim, exfiltrates arbitrary files from the filesystem into the bento archive. This enables supply chain attacks where sensitive files (SSH keys, credentials, environment variables) are silently embedded in bentos and exposed when pushed to registries or deployed. Version 1.4.34 contains a patch for the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-26
Last Modified
2026-02-03
Generated
2026-05-07
AI Q&A
2026-01-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bentoml bentoml to 1.4.34 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in BentoML versions prior to 1.4.34 allows an attacker to perform path traversal attacks via multiple file path fields in the bentofile.yaml configuration. By crafting a malicious bentofile, an attacker can cause the build process to exfiltrate arbitrary files from the victim's filesystem into the bento archive. This means sensitive files like SSH keys, credentials, or environment variables can be silently embedded and exposed when the bentos are pushed to registries or deployed.


How can this vulnerability impact me? :

The vulnerability can lead to supply chain attacks where sensitive files from the victim's filesystem are exfiltrated and embedded into BentoML bentos without the victim's knowledge. This exposure of sensitive information such as SSH keys, credentials, and environment variables can compromise system security and lead to unauthorized access or data breaches when the bentos are pushed to registries or deployed.


What immediate steps should I take to mitigate this vulnerability?

Upgrade BentoML to version 1.4.34 or later, which contains a patch for the path traversal vulnerability in bentofile.yaml. Avoid building bentos from untrusted bentofile.yaml files to prevent supply chain attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart