- Description
- BentoML is a Python library for building online serving systems optimized for AI apps and model inference. In versions 1.4.0 until 1.4.19, the file upload processing system contains an SSRF vulnerability that allows unauthenticated remote attackers to force the server to make arbitrary HTTP requests. The vulnerability stems from the multipart form data and JSON request handlers, which automatically download files from user-provided URLs without validating whether those URLs point to internal network addresses, cloud metadata endpoints, or other restricted resources. The documentation explicitly promotes this URL-based file upload feature, making it an intended design that exposes all deployed services to SSRF attacks by default. Version 1.4.19 contains a patch for the issue.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- bentoml
CVSS 3.1
- Type
- Secondary
- Base score
- 9.9
- Impact score
- 5.3
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
- Severity
- CRITICAL
- security-advisories@github.com
- CWE-918
- Hype score
- Not currently trending
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381 https://t.co/BH7Hwd8lDR https://t.co/34KfHiSFpF
@IT_Peurico
24 Sept 2025
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381 https://t.co/0YDgJJjcsg https://t.co/BZw8IW2XFH
@secured_cyber
22 Sept 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381 https://t.co/TxZLs1egkh https://t.co/9yA3Jos2Bh
@secured_cyber
22 Sept 2025
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381 https://t.co/vGW7mJBvED https://t.co/b3I4xArsGS
@valterpcjr
19 Sept 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381 https://t.co/3OghIedYfS https://t.co/UjF7zMUInR
@pcasano
19 Sept 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381 https://t.co/nINxykryFf https://t.co/opW1i5wJKz
@Trej0Jass
18 Sept 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381 https://t.co/iqrkms92dM https://t.co/OiHfgydPbE
@ggrubamn
17 Sept 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#CVE-2025-54381 | BentoML - Unauthenticated SSRF (Critical) #BentoML versions 1.4.0 to 1.4.18 are vulnerable to an unauthenticated Server-Side Request Forgery (#SSRF) due to improper validation of user-provided URLs in file upload handlers. This allows attackers to force the ht
@CheckmarxZero
30 Jul 2025
59 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨BentoML SSRF (CVE-2025-54381) lets attackers force servers to make arbitrary HTTP requests, exposing internal networks! Upgrade to v1.4.19 NOW. Protect your AI apps. 🔒 More info: https://t.co/BJ6cNeIioM https://t.co/jKHzpOzkY2
@rapidriskradar
30 Jul 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Warning: SSRF vulnerability in @bentomlai (1.4.0–1.4.18). #CVE-2025-54381 CVSS: 9.9. Unauth attackers can trigger internal HTTP requests via file upload. This flaw exposes deployed AI services to SSRF! Fixed in 1.4.19. #Patch #Patch #Patch https://t.co/OvUZLFY0hA
@CCBalert
30 Jul 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨🚨CVE-2025-54381 (CVSS 9.9): BentoML SSRF vuln lets unauthenticated attackers trigger rogue HTTP requests via file uploads, risking internal networks & cloud metadata due to unvalidated URLs. Search by vul.cve Filter👉vul.cve="CVE-2025-54381" ZoomEye Dork👉app="Ben
@zoomeye_team
30 Jul 2025
922 Impressions
3 Retweets
13 Likes
3 Bookmarks
0 Replies
0 Quotes
[CVE-2025-54381: CRITICAL] BentoML versions 1.4.0-1.4.19 have SSRF vulnerabilities allowing unauthenticated attackers to make server HTTP requests; Patch available in version 1.4.19.#cve,CVE-2025-54381,#cybersecurity https://t.co/bMjVSRzltJ https://t.co/3BckdAJ8mO
@CveFindCom
29 Jul 2025
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDC38760-A29D-4F73-A6EE-1AEF5BE60C37",
"versionEndExcluding": "1.4.19",
"versionStartIncluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]