PT-2025-12262 · Vllm · Vllm

Published

2025-03-20

·

Updated

2025-04-29

·

CVE-2024-9053

CVSS v3.1

9.8

Critical

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions vllm-project vllm version 0.6.0
Description The issue concerns a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run server loop() calls the function make handler coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.
Recommendations For vllm-project vllm version 0.6.0, consider disabling the make handler coro() function or restricting the use of cloudpickle.loads() until a patch is available to prevent remote code execution. Additionally, avoid using unsanitized received messages in the run server loop() function to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

Deserialization of Untrusted Data

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2024-9053
GHSA-CJ47-QJ6G-X7R4

Affected Products

Vllm