PT-2025-12262 · Vllm · Vllm
Published
2025-03-20
·
Updated
2025-04-29
·
CVE-2024-9053
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
vllm-project vllm version 0.6.0
Description
The issue concerns a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run server loop() calls the function make handler coro(), which directly uses
cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.Recommendations
For vllm-project vllm version 0.6.0, consider disabling the
make handler coro() function or restricting the use of cloudpickle.loads() until a patch is available to prevent remote code execution. Additionally, avoid using unsanitized received messages in the run server loop() function to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
RCE
Deserialization of Untrusted Data
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Vllm