Remote Code Execution in BentoML Python Library
CVE-2025-27520
What is CVE-2025-27520?
CVE-2025-27520 is a significant vulnerability affecting the BentoML Python library, which is used for building online serving systems tailored for AI applications and model inference. This vulnerability stems from insecure deserialization, allowing unauthorized users to execute arbitrary code on servers running affected versions of the library. Organizations utilizing BentoML in their AI workflows could be negatively impacted by this flaw, as it poses risks of unauthorized access and potential control over server functionalities, leading to data compromise or service disruption.
Technical Details
CVE-2025-27520 involves a weakness within the serialization and deserialization processes of the BentoML library, specifically identified in the serde.py file of version 1.4.2. The issue allows any unauthenticated user to exploit the deserialization process, facilitating remote code execution (RCE) on the server. The vulnerability has been addressed in the subsequent release, version 1.4.3, where patching measures have been implemented to safeguard against such exploitation.
Potential Impact of CVE-2025-27520
-
Unauthorized Code Execution: The vulnerability enables attackers to run arbitrary code on affected servers, potentially compromising server integrity and executing malicious payloads that can impact confidentiality and availability.
-
Data Breaches: By leveraging this vulnerability, threat actors could gain access to sensitive data stored on the server, leading to significant data breaches and exposing organizational data to unauthorized entities.
-
Operational Disruption: The execution of arbitrary code can disrupt normal operations of affected AI services, resulting in downtime and loss of availability, which can severely impact business processes relying on these applications.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
BentoML >= 1.3.4, < 1.4.3
References
EPSS Score
75% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
