CVE-2025-27520

CRITICAL LAB

BentoML v1.4.2 - RCE

Title source: llm
STIX 2.1

Description

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version (v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server. It exists an unsafe code segment in serde.py. This vulnerability is fixed in 1.4.3.

Exploits (3)

nomisec WORKING POC
by Evillm · poc
https://github.com/Evillm/CVE-2025-27520-PoC
nomisec WORKING POC
by amalpvatayam67 · poc
https://github.com/amalpvatayam67/day09-bentoml-deser-lab
metasploit WORKING POC EXCELLENT
by c2an1, Takahiro Yokoyama · rubypocpython
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/bentoml_rce_cve_2025_27520.rb

Scores

CVSS v3 9.8
EPSS 0.8095
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-502
Status published
Products (2)
bentoml/bentoml 1.3.4 - 1.4.2
pypi/bentoml 1.3.4 - 1.4.3PyPI
Published Apr 04, 2025
Tracked Since Feb 18, 2026