SB2026050122 - Multiple vulnerabilities in vLLM



SB2026050122 - Multiple vulnerabilities in vLLM

Published: May 1, 2026

Security Bulletin ID SB2026050122
CSH Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 33% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Deserialization of Untrusted Data (CVE-ID: CVE-2025-32434)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data when loading a model using torch.load with weights_only=True. A remote attacker can trick the victim into loading a specially crafted model and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Resource exhaustion (CVE-ID: CVE-2025-29770)

The vulnerability allows a remote user to cause a denial of service.

The vulnerability exists due to uncontrolled resource consumption in outlines grammar cache in vllm/model_executor/guided_decoding/outlines_logits_processors.py when handling decoding requests with unique schemas. A remote user can send a stream of very short decoding requests with unique schemas to cause a denial of service.

The issue applies to the V0 engine only. The outlines backend can also be selected on a per-request basis using the guided_decoding_backend key in the extra_body field.


3) Deserialization of Untrusted Data (CVE-ID: CVE-2025-29783)

The vulnerability allows a remote user to execute arbitrary code.

The vulnerability exists due to deserialization of untrusted data in the Mooncake integration mooncake_pipe.py when processing network-supplied data over ZMQ/TCP. A remote user can send a specially crafted serialized payload to execute arbitrary code.

Only deployments configured to use Mooncake for distributed KV transfer are vulnerable.


Remediation

Install update from vendor's website.