Description
SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication.
Published: 2026-03-12
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch
AI Analysis

Impact

SGLang’s encoder parallel disaggregation system deserializes untrusted data using pickle.loads() in the disaggregation module without authentication, which allows an attacker to supply malicious payloads. This results in unauthenticated remote code execution, granting full control over affected servers and compromising confidentiality, integrity, and availability. The vulnerability is classified as CWE-502: Deserialization of Untrusted Data.

Affected Systems

The affected product is the SGLang framework from the vendor SGLang. No specific version information is provided by the CNA; therefore, all releases that include the disaggregation module are potentially impacted. The vulnerable component is identified by the CPE cpe:2.3:a:lmsys:sglang:*:*:*:*:*:*:*:*.

Risk and Exploitability

The CVSS score of 9.8 indicates critical severity. The EPSS score is less than 1%, suggesting a low current probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The exploit requires an attacker to send crafted data to the disaggregation module, and because it is unauthenticated and exposed over a network-accessible interface, the likely attack vector is remote network-based, inferred from the description.

Generated by OpenCVE AI on March 17, 2026 at 17:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website for updates or patches that remove the insecure pickle.loads usage or replace it with a secure deserialization mechanism.
  • If no patch is available, restrict network access to the disaggregation module and ensure that only trusted inputs are processed, or replace pickle.loads with a safe alternative if possible.
  • Disable or bypass the disaggregation functionality if it is not required for your deployment to reduce exposure.
  • Monitor logs and traffic for anomalous data to detect potential exploitation attempts.

Generated by OpenCVE AI on March 17, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jx93-g359-86wm SGLang's encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module
History

Tue, 07 Apr 2026 20:45:00 +0000


Tue, 17 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Lmsys
Lmsys sglang
CPEs cpe:2.3:a:lmsys:sglang:*:*:*:*:*:*:*:*
Vendors & Products Lmsys
Lmsys sglang

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Sglang
Sglang sglang
Vendors & Products Sglang
Sglang sglang

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-502
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication.
Title CVE-2026-3060
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-07T18:45:35.370Z

Reserved: 2026-02-23T18:17:34.976Z

Link: CVE-2026-3060

cve-icon Vulnrichment

Updated: 2026-03-12T14:19:27.200Z

cve-icon NVD

Status : Modified

Published: 2026-03-12T12:15:59.530

Modified: 2026-04-07T19:16:47.007

Link: CVE-2026-3060

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:49:54Z

Weaknesses