We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54381

BentoML is Vulnerable to an SSRF Attack Through File Upload Processing



Description

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. In versions 1.4.0 until 1.4.19, the file upload processing system contains an SSRF vulnerability that allows unauthenticated remote attackers to force the server to make arbitrary HTTP requests. The vulnerability stems from the multipart form data and JSON request handlers, which automatically download files from user-provided URLs without validating whether those URLs point to internal network addresses, cloud metadata endpoints, or other restricted resources. The documentation explicitly promotes this URL-based file upload feature, making it an intended design that exposes all deployed services to SSRF attacks by default. Version 1.4.19 contains a patch for the issue.

Reserved 2025-07-21 | Published 2025-07-29 | Updated 2025-07-30 | Assigner GitHub_M


CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

>= 1.4.0, < 1.4.19
affected

References

github.com/...entoML/security/advisories/GHSA-mrmq-3q62-6cc8

github.com/...ommit/534c3584621da4ab954bdc3d814cc66b95ae5fb8

cve.org (CVE-2025-54381)

nvd.nist.gov (CVE-2025-54381)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54381

Support options

Helpdesk Chat, Email, Knowledgebase