CVE-2025-27520
CRITICALBentoML v1.4.2 - RCE
Title source: llmDescription
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version (v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server. It exists an unsafe code segment in serde.py. This vulnerability is fixed in 1.4.3.
Exploits (3)
nomisec
WORKING POC
by amalpvatayam67 · poc
https://github.com/amalpvatayam67/day09-bentoml-deser-lab
metasploit
WORKING POC
EXCELLENT
by c2an1, Takahiro Yokoyama · rubypocpython
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/bentoml_rce_cve_2025_27520.rb
Scores
CVSS v3
9.8
EPSS
0.8735
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (2)
bentoml/bentoml
< 1.4.2
pypi/bentoml
< 1.4.3PyPI
Timeline
Published
Apr 04, 2025
Tracked Since
Feb 18, 2026