CVE-2026-35043
Published: 06 April 2026
Summary
CVE-2026-35043 is a high-severity OS Command Injection (CWE-78) vulnerability in Bentoml Bentoml. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 6.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Machine Learning Libraries.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation by upgrading BentoML to version 1.4.38 or later directly eliminates the command injection vulnerability in the cloud deployment path.
Validating and sanitizing the user-specified system_packages input before interpolating it into shell commands prevents command injection exploitation during BentoCloud deployments.
Vulnerability monitoring and scanning identifies the presence of CVE-2026-35043 in BentoML components, enabling proactive remediation before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection (CWE-78) in cloud deployment script generation directly enables arbitrary Unix shell command execution on remote CI/CD infrastructure via local client exploitation with user interaction.
NVD Description
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line 1648 interpolates system_packages directly into…
more
a shell command using an f-string without any quoting. The generated script is uploaded to BentoCloud as setup.sh and executed on the cloud build infrastructure during deployment, making this a remote code execution on the CI/CD tier. This vulnerability is fixed in 1.4.38.
Deeper analysisAI
CVE-2026-35043 is a command injection vulnerability (CWE-78) in BentoML, an open-source Python library for building online serving systems optimized for AI applications and model inference. The issue affects versions prior to 1.4.38 and resides in the cloud deployment path at src/bentoml/_internal/cloud/deployment.py. Specifically, line 1648 interpolates the user-specified system_packages directly into a shell command using an f-string without proper quoting or sanitization. This flaw was not addressed in the prior fix for CVE-2026-33744. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on 2026-04-06.
An attacker can exploit this vulnerability by supplying a malicious system_packages value during a BentoCloud deployment. The tainted input generates a setup.sh script that is uploaded and executed on BentoCloud's cloud build infrastructure, enabling remote code execution on the CI/CD tier. Exploitation requires local access to run the BentoML deployment command (aligning with the local attack vector), no privileges, low complexity, and user interaction to initiate the deployment, but results in high confidentiality, integrity, and availability impacts on the remote infrastructure.
The BentoML security advisory at https://github.com/bentoml/BentoML/security/advisories/GHSA-fgv4-6jr3-jgfw confirms the vulnerability and states that it is fixed in version 1.4.38. Security practitioners should advise users to upgrade to BentoML 1.4.38 or later to mitigate the risk.
This vulnerability is particularly relevant for AI/ML workflows, as BentoML is designed for serving AI models, and exploitation could compromise cloud CI/CD pipelines handling model inference deployments. No public information on real-world exploitation is available.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Machine Learning Libraries
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: ai