{"id":"CVE-2024-9053","details":"vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.","aliases":["GHSA-cj47-qj6g-x7r4"],"modified":"2026-03-12T17:28:39.641434Z","published":"2025-03-20T10:15:46.327Z","related":["CGA-3v4f-cwxh-76gp"],"references":[{"type":"EVIDENCE","url":"https://huntr.com/bounties/75a544f3-34a3-4da0-b5a3-1495cb031e09"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"0.6.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-9053.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}