CVE-2026-35044 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: April 7, 2026
BentoML - Template Injection
Overview
BentoML < 1.4.38 contains a template injection caused by unsandboxed jinja2.Environment with jinja2.ext.do extension in Dockerfile generation, letting attackers execute arbitrary Python code on the host, exploit requires importing a malicious bento archive and running containerize.
Severity & Score
Impact
Attackers can execute arbitrary Python code on the host, bypassing container isolation and potentially compromising the entire system.
Mitigation
Update to version 1.4.38 or later.
Social Media Activity(1 post)
š CVE-2026-35044 - High (8.8) BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandbo... š https://www.thehackerwire.com/vulnerability/CVE-2026-35044/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-35044
- Severity
- High
- CVSS Score
- 8.8
- Type
- template_injection
- Status
- unconfirmed
- EPSS
- 4.1%
- Social Posts
- 1
CWE
- CWE-1336
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H