Impact
SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, as it deserializes untrusted data using pickle.loads() without authentication. This flaw is a classic example of the insecure deserialization weakness (CWE-502) and allows an attacker to execute arbitrary code on the system that hosts the SGLang service. The impact is full system compromise, enabling attackers to read, modify, or delete data, or install additional malware.
Affected Systems
The vulnerability affects the SGLang framework (vendor: SGLang, product: SGLang). No specific version range is listed in the CNA data, so all installed instances of SGLang that use the multimodal generation module are potentially affected unless the vendor has otherwise specified an exemption.
Risk and Exploitability
The CVSS score is 9.8, indicating critical severity. The EPSS score is below 1%, suggesting low probability of exploitation in the wild, but the lack of a KEV listing does not diminish the need for attention. The flaw can be leveraged over the ZMQ broker without authentication, meaning any user who can send messages to the broker could trigger the deserialization and run arbitrary code. Because the attack requires only network access to the broker, it is considered high-risk for exposed services.
OpenCVE Enrichment
Github GHSA