Description
LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code execution.
Published: 2026-02-17
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

LightLLM versions 1.1.0 and earlier contain an unsafe deserialization flaw in the PD (prefill-decode) disaggregation mode. The application exposes WebSocket endpoints that accept binary frames and feed them directly to pickle.loads() without any authentication or input validation. This design allows a remote attacker who can reach the PD master node to supply a crafted pickle payload that is executed with the privileges of the running process, providing full control over the system. The vulnerability is classified as CWE-502 and carries a CVSS base score of 9.3, indicating a severe threat to confidentiality, integrity, and availability.

Affected Systems

The flaw affects all installations of ModelTC LightLLM with version 1.1.0 or lower that use PD mode. No specific patch versions have been listed in the data; the issue is inherent to the vulnerable code paths in these releases.

Risk and Exploitability

The CVSS score of 9.3 combined with an EPSS less than 1 % suggests the vulnerability is highly severe but currently has a low probability of being exploited in the wild. The lack of authentication or input checks means an attacker can exploit it remotely via a WebSocket connection to the PD master node. The vulnerability is not listed in CISA’s KEV catalog, implying no confirmed exploit activity to date. The attack surface is limited to systems that expose the WebSocket endpoints publicly or to untrusted networks.

Generated by OpenCVE AI on April 17, 2026 at 18:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LightLLM to the latest version that removes the pickle.loads usage in PD mode.
  • If an upgrade is not immediately possible, disable PD mode or block the WebSocket endpoints behind firewall rules so that only trusted internal hosts can reach the PD master.
  • Restrict network access to the PD master node, isolating it from the public or less trusted segments and applying least‑privilege controls on the host.
  • As a temporary safeguard, modify the server code to validate or reject untrusted pickle payloads, or replace pickle with a safer serialization library.

Generated by OpenCVE AI on April 17, 2026 at 18:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Modeltc
Modeltc lightllm
Vendors & Products Modeltc
Modeltc lightllm

Tue, 17 Feb 2026 02:30:00 +0000

Type Values Removed Values Added
Description LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code execution.
Title LightLLM <= 1.1.0 PD Mode Unsafe Deserialization RCE
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Modeltc Lightllm
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-17T14:37:46.080Z

Reserved: 2026-02-11T20:08:07.944Z

Link: CVE-2026-26220

cve-icon Vulnrichment

Updated: 2026-02-17T14:37:39.175Z

cve-icon NVD

Status : Deferred

Published: 2026-02-17T03:16:01.893

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-26220

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T19:00:11Z

Weaknesses