Description
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version (v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server. It exists an unsafe code segment in serde.py. This vulnerability is fixed in 1.4.3.
Exploits (3)
nomisec
WORKING POC
by amalpvatayam67 · poc
https://github.com/amalpvatayam67/day09-bentoml-deser-lab
metasploit
WORKING POC
EXCELLENT
by c2an1, Takahiro Yokoyama · rubypocpython
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/bentoml_rce_cve_2025_27520.rb
Scores
CVSS v3
9.8
EPSS
0.8095
EPSS Percentile
99.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Lab Environment
Details
CWE
CWE-502
Status
published
Products (2)
bentoml/bentoml
1.3.4 - 1.4.2
pypi/bentoml
1.3.4 - 1.4.3PyPI
Published
Apr 04, 2025
Tracked Since
Feb 18, 2026