Description
SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.
Published: 2026-03-12
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in SGLang’s replay_request_dump.py script, which performs insecure deserialization by calling pickle.load() on untrusted data without validation. An attacker that can supply a crafted .pkl file to the script can execute arbitrary code on the device running the script, leading to full compromise of confidentiality, integrity, and availability of the affected system. This weakness corresponds to the common weakness classification CWE-502 (Insecure Deserialization).

Affected Systems

Affected vendor: SGLang. Product: SGLang, specifically the replay_request_dump.py script. No precise version information is provided in the CVE data, so any release that includes this script is potentially vulnerable.

Risk and Exploitability

The CVSS score of 7.8 indicates high severity. The EPSS score of less than 1% suggests low likelihood of exploitation in the near term, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector requires an attacker to get the malicious .pkl file processed by the script, which normally runs under the privileges of the user executing it. If the script is executed with elevated or privileged rights, the attacker can gain extensive system control. The exploit path is straightforward: supply a malicious pickle payload, invoke the script, and the payload’s code is executed during deserialization. The vulnerability can be prevented by removing the insecure load or ensuring only trusted data is deserialized.

Generated by OpenCVE AI on March 17, 2026 at 17:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update SGLang to the latest version that removes or protects the replay_request_dump.py functionality.
  • If an update is not available, modify the script to validate or restrict the data loaded by pickle, or replace it with a safer serialization format such as JSON.
  • Restrict execution of replay_request_dump.py to trusted users and run it in isolated environments to limit the impact of a potential exploit.
  • Monitor for unexpected execution of the script with .pkl files and audit related logs for suspicious activity.

Generated by OpenCVE AI on March 17, 2026 at 17:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hvwj-8w5g-28rg SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization
History

Tue, 07 Apr 2026 20:45:00 +0000


Mon, 16 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Sglang
Sglang sglang
Vendors & Products Sglang
Sglang sglang

Thu, 12 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.
Title CVE-2026-3989
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-07T18:46:48.636Z

Reserved: 2026-03-11T16:41:06.512Z

Link: CVE-2026-3989

cve-icon Vulnrichment

Updated: 2026-03-16T18:20:56.612Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T12:15:59.630

Modified: 2026-04-07T19:16:47.170

Link: CVE-2026-3989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:49:53Z

Weaknesses

No weakness.