Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fgv4-6jr3-jgfw | BentoML: Command Injection in cloud deployment setup script |
Fri, 10 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:* |
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bentoml
Bentoml bentoml |
|
| Vendors & Products |
Bentoml
Bentoml bentoml |
Mon, 06 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line 1648 interpolates system_packages directly into a shell command using an f-string without any quoting. The generated script is uploaded to BentoCloud as setup.sh and executed on the cloud build infrastructure during deployment, making this a remote code execution on the CI/CD tier. This vulnerability is fixed in 1.4.38. | |
| Title | BentoML: command injection in cloud deployment setup script (deployment.py) | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T14:09:07.570Z
Reserved: 2026-03-31T21:06:06.428Z
Link: CVE-2026-35043
Updated: 2026-04-07T14:08:57.594Z
Status : Analyzed
Published: 2026-04-06T18:16:41.823
Modified: 2026-04-10T18:54:17.160
Link: CVE-2026-35043
No data.
OpenCVE Enrichment
Updated: 2026-04-13T14:27:43Z
Github GHSA