Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. bentoml
  4. ›
  5. CVE-2026-40610

CVE-2026-40610: BentoML has Information Disclosure in `bentoml build` via symlink traversal in the build context

May 7, 2026

BentoML’s bentoml build packaging workflow follows attacker-controlled symlinks inside the build context and copies the referenced file contents into the generated Bento artifact.

If a victim builds an untrusted repository or other attacker-supplied build context, the attacker can place a symlink such as loot.txt -> /tmp/outside-marker.txt or a link to a more sensitive local file. When bentoml build runs, BentoML dereferences the symlink and packages the target file contents into the Bento. The leaked file can then propagate further through export, push, or containerization workflows.

References

  • github.com/advisories/GHSA-mcfx-4vc6-qgxv
  • github.com/bentoml/BentoML
  • github.com/bentoml/BentoML/security/advisories/GHSA-mcfx-4vc6-qgxv
  • nvd.nist.gov/vuln/detail/CVE-2026-40610

Code Behaviors & Features

Detect and mitigate CVE-2026-40610 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.4.39

Fixed versions

  • 1.4.39

Solution

Upgrade to version 1.4.39 or above.

Impact 5.5 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-59: Improper Link Resolution Before File Access ('Link Following')

Source file

pypi/bentoml/CVE-2026-40610.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:19:23 +0000.