CVE-2025-32375
Insecure Deserialization leads to RCE in BentoML's runner server
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8.
There was an insecure deserialization in BentoML's runner server prior to version 1.4.8. By setting specific headers and parameters in the POST request, it is possible to execute unauthorized arbitrary code in the context of the user running the server, which will grant initial access and information disclosure.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2025-04-06 CVE Reserved
- 2025-04-09 CVE Published
- 2025-04-09 CVE Updated
- 2025-04-23 First Exploit
- 2025-05-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/bentoml/BentoML/security/advisories/GHSA-7v4r-c989-xh26 | X_refsource_confirm | |
https://github.com/advisories/GHSA-7v4r-c989-xh26 |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/190623 | 2025-04-23 | |
https://github.com/theGEBIRGE/CVE-2025-32375 | 2025-05-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Bentoml Search vendor "Bentoml" | BentoML Search vendor "Bentoml" for product "BentoML" | >= 1.0.0 < 1.4.8 Search vendor "Bentoml" for product "BentoML" and version " >= 1.0.0 < 1.4.8" | en |
Affected
|