A deserialization vulnerability exists in BentoML's runner server in bentoml/bentoml versions <=1.3.4.post1. By setting specific parameters, an attacker can execute unauthorized arbitrary code on the server, causing severe harm. The vulnerability is triggered when the args-number parameter is greater than 1, leading to automatic deserialization and arbitrary code execution.
{
"github_reviewed_at": "2025-03-21T03:32:48Z",
"nvd_published_at": "2025-03-20T10:15:46Z",
"cwe_ids": [
"CWE-502"
],
"severity": "CRITICAL",
"github_reviewed": true
}