Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jfjg-vc52-wqvf | BentoML has Dockerfile Command Injection via system_packages in bentofile.yaml |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:* |
Fri, 27 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bentoml
Bentoml bentoml |
|
| Vendors & Products |
Bentoml
Bentoml bentoml |
Fri, 27 Mar 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during `bentoml containerize` / `docker build`. Version 1.4.37 fixes the issue. | |
| Title | BentoML has Dockerfile Command Injection via system_packages in bentofile.yaml | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T20:01:40.600Z
Reserved: 2026-03-23T17:34:57.562Z
Link: CVE-2026-33744
Updated: 2026-03-27T20:01:33.499Z
Status : Analyzed
Published: 2026-03-27T01:16:21.007
Modified: 2026-04-01T15:00:48.743
Link: CVE-2026-33744
No data.
OpenCVE Enrichment
Updated: 2026-04-02T07:55:49Z
Github GHSA