Severity:

HIGH RISK

(7.4)

Path Traversal in bentofile.yaml (CWE-22) Leading to Sensitive File Exfiltration in BentoML

CVE-2026-24123

Published:

Jan 26, 2026

Status:

Analyzed

Summary

Affected Context

Exploit Preconditions

Why This Happens

Potential Impact

General Mitigation Guidance

How Teams Detect Issues Like This

Frequently Asked Questions

Source

NDV

Vulnerability Type

Vulnerability Type

Vulnerability Type

Category:

Path Traversal

CWE:

CWE-22

Impact:

Sensitive Data Exposure and Supply-Chain Compromise

Severity:

HIGH RISK

(7.4)

CVSS Version:

3.1

Vulnerability Type

Category:

Path Traversal

CWE:

CWE-22

Impact:

Sensitive Data Exposure and Supply-Chain Compromise

Severity:

HIGH RISK

(7.4)

CVSS Version:

3.1

Catch This CVE While Code Is Being Written

Detect vulnerable code directly in pull requests, so CVEs are fixed before merge.