SB2026010936 - Multiple vulnerabilities in vLLM
Published: January 9, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2025-46560)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists in the input preprocessing logic of the multimodal tokenizer. A remote user can pass specially crafted data to the application to trigger resource exhaustion and perform a denial of service (DoS) attack.
2) Deserialization of untrusted data (CVE-ID: CVE-2025-32444)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data in Mooncake integration. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.
Note, only systems with Mooncake integration are affected.
3) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-30202)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when processing connection requests. A remote attacker can establish multiple connections to the XPUB socket without reading any data and perform a denial of service attack.
4) Deserialization of untrusted data (CVE-ID: CVE-2025-47277)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data within the PyNcclPipe service. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.
Note, this vulnerability affects only environments using the PyNcclPipe KV cache transfer integration with the V0 engine.
Remediation
Install update from vendor's website.
References
- https://github.com/vllm-project/vllm/security/advisories/GHSA-vc6m-hm49-g9qg
- https://github.com/vllm-project/vllm/security/advisories/GHSA-hj4w-hm2g-p6w5
- https://github.com/vllm-project/vllm/security/advisories/GHSA-9f8f-2vmf-885j
- https://github.com/vllm-project/vllm/security/advisories/GHSA-hjq4-87xh-g4fv