SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication.
References
| Link | Resource |
|---|---|
| https://github.com/sgl-project/sglang/blob/main/python/sglang/multimodal_gen/runtime/scheduler_client.py | Product |
| https://github.com/sgl-project/sglang/security/advisories/GHSA-3cp7-c6q2-94xr | Broken Link |
| https://orca.security/resources/blog/sglang-llm-framework-rce-vulnerabilities/ | Exploit Mitigation Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-12 12:15
Updated : 2026-03-17 14:19
NVD link : CVE-2026-3059
Mitre link : CVE-2026-3059
CVE.ORG link : CVE-2026-3059
JSON object : View
Products Affected
lmsys
- sglang
CWE
CWE-502
Deserialization of Untrusted Data
