CVE-2026-24123
BaseFortify
Publication date: 2026-01-26
Last updated on: 2026-02-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bentoml | bentoml | to 1.4.34 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in BentoML versions prior to 1.4.34 allows an attacker to perform path traversal attacks via multiple file path fields in the bentofile.yaml configuration. By crafting a malicious bentofile, an attacker can cause the build process to exfiltrate arbitrary files from the victim's filesystem into the bento archive. This means sensitive files like SSH keys, credentials, or environment variables can be silently embedded and exposed when the bentos are pushed to registries or deployed.
How can this vulnerability impact me? :
The vulnerability can lead to supply chain attacks where sensitive files from the victim's filesystem are exfiltrated and embedded into BentoML bentos without the victim's knowledge. This exposure of sensitive information such as SSH keys, credentials, and environment variables can compromise system security and lead to unauthorized access or data breaches when the bentos are pushed to registries or deployed.
What immediate steps should I take to mitigate this vulnerability?
Upgrade BentoML to version 1.4.34 or later, which contains a patch for the path traversal vulnerability in bentofile.yaml. Avoid building bentos from untrusted bentofile.yaml files to prevent supply chain attacks.