CVE-2024-9053 – vllm
Package
Manager: pip
Name: vllm
Vulnerable Version: >=0 <=0.6.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00785 pctl0.72901
Details
vLLM allows Remote Code Execution by Pickle Deserialization via AsyncEngineRPCServer() RPC server entrypoints vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.
Metadata
Created: 2025-03-20T12:32:50Z
Modified: 2025-03-21T03:30:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-cj47-qj6g-x7r4/GHSA-cj47-qj6g-x7r4.json
CWE IDs: ["CWE-502", "CWE-78"]
Alternative ID: GHSA-cj47-qj6g-x7r4
Finding: F096
Auto approve: 1