PT-2026-8395 · Lightllm · Lightllm

Valentin Lobstein

·

Published

2026-02-17

·

Updated

2026-02-17

·

CVE-2026-26220

CVSS v4.0
9.3
VectorAV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions LightLLM versions prior to 1.2.0
Description LightLLM versions 1.1.0 and earlier have an unauthenticated remote code execution issue in prefill-decode (PD) disaggregation mode. The PD master node has WebSocket endpoints that accept binary frames and directly pass the data to the
pickle.loads()
function without any authentication or validation. An attacker who can access the PD master can send a specially crafted payload to execute arbitrary code. The vulnerable component utilizes the
pickle.loads()
function, which can execute arbitrary code when processing malicious data.
Recommendations Update to LightLLM version 1.2.0 or later.

Exploit

Fix

RCE

Deserialization of Untrusted Data

Weakness Enumeration

Related Identifiers

CVE-2026-26220

Affected Products

Lightllm