LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-35044

CVE-2026-35044 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: April 7, 2026

BentoML - Template Injection

Published: April 6, 2026Updated: April 7, 2026Remote Exploitable

Overview

BentoML < 1.4.38 contains a template injection caused by unsandboxed jinja2.Environment with jinja2.ext.do extension in Dockerfile generation, letting attackers execute arbitrary Python code on the host, exploit requires importing a malicious bento archive and running containerize.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 4.1%(Probability of exploitation in next 30 days)

Impact

Attackers can execute arbitrary Python code on the host, bypassing container isolation and potentially compromising the entire system.

Mitigation

Update to version 1.4.38 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Apr 7, 2026

🟠 CVE-2026-35044 - High (8.8) BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandbo... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-35044/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-35044
Severity
High
CVSS Score
8.8
Type
template_injection
Status
unconfirmed
EPSS
4.1%
Social Posts
1

CWE

  • CWE-1336

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS Score

4.1%Probability of exploitation in the next 30 days