Логотип exploitDog
bind:CVE-2025-32375
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-32375

Количество 2

Количество 2

nvd логотип

CVE-2025-32375

10 месяцев назад

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-7v4r-c989-xh26

10 месяцев назад

BentoML's runner server Vulnerable to Remote Code Execution (RCE) via Insecure Deserialization

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-32375

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8.

CVSS3: 9.8
55%
Средний
10 месяцев назад
github логотип
GHSA-7v4r-c989-xh26

BentoML's runner server Vulnerable to Remote Code Execution (RCE) via Insecure Deserialization

CVSS3: 9.8
55%
Средний
10 месяцев назад

Уязвимостей на страницу