vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-6874 vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.
Github GHSA Github GHSA GHSA-cj47-qj6g-x7r4 vLLM allows Remote Code Execution by Pickle Deserialization via AsyncEngineRPCServer() RPC server entrypoints
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 15 Oct 2025 13:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-502

Tue, 29 Apr 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Vllm-project
Vllm-project vllm
CPEs cpe:2.3:a:vllm-project:vllm:0.6.0:*:*:*:*:*:*:*
Vendors & Products Vllm-project
Vllm-project vllm
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 25 Mar 2025 01:45:00 +0000


Thu, 20 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.
Title Remote Code Execution in vllm-project/vllm
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-10-15T12:50:44.722Z

Reserved: 2024-09-20T18:43:46.911Z

Link: CVE-2024-9053

cve-icon Vulnrichment

Updated: 2025-03-20T17:52:56.157Z

cve-icon NVD

Status : Modified

Published: 2025-03-20T10:15:46.327

Modified: 2025-10-15T13:15:57.077

Link: CVE-2024-9053

cve-icon Redhat

Severity : Low

Publid Date: 2025-03-20T10:09:33Z

Links: CVE-2024-9053 - Bugzilla

cve-icon OpenCVE Enrichment

No data.