Description
SGLangs multimodal generation runtime is vulnerable to an unauthenticated path traversal vulnerability, allowing an attacker to write arbitrary files anywhere the server process has write access, by including ../ sequences in the upload filename when sent to specific endpoints.
Published: 2026-05-18
Score: 9.1 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

SGLang’s multimodal generation runtime contains an unauthenticated path‑traversal flaw that lets an attacker supply a filename containing "../" sequences. The flaw allows the attacker to create or overwrite any file on the server where the process has write permission. By placing executable or configuration files in directories that the application or the operating system can execute, an attacker could gain remote code execution, compromise data integrity, and affect overall availability.

Affected Systems

The affected vendor is SGLang; the vulnerable component is its multimodal generation runtime. Version information is not specified in the advisory, so any release that includes the upload endpoint handling described may be impacted. No more granular product or version details are available.

Risk and Exploitability

The vulnerability is exploitable without authentication, as the attack relies solely on submitting a crafted upload filename to a vulnerable endpoint. Based on the description, it is inferred that the endpoint is reachable over the network, typically via HTTPS or HTTP. The lack of an assigned CVSS or EPSS score means the exact severity cannot be quantified, but the simplicity of the path‑traversal and the ability to write arbitrary files indicate a high potential for exploitation. The vulnerability is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on May 18, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a SGLang release that fixes the path‑traversal vulnerability once available
  • Restrict access to the upload endpoint by requiring authentication or disabling it entirely
  • Implement server‑side validation that rejects or sanitizes "../" components in filenames and enforces a fixed upload directory
  • Configure filesystem permissions so the upload directory is not writable by the web server process or is outside the web‑root

Generated by OpenCVE AI on May 18, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
CWE-23
CWE-35
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 18 May 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Sglang
Sglang sglang
Vendors & Products Sglang
Sglang sglang

Mon, 18 May 2026 12:00:00 +0000

Type Values Removed Values Added
Description SGLangs multimodal generation runtime is vulnerable to an unauthenticated path traversal vulnerability, allowing an attacker to write arbitrary files anywhere the server process has write access, by including ../ sequences in the upload filename when sent to specific endpoints.
Title CVE-2026-7302
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-05-18T14:05:33.942Z

Reserved: 2026-04-28T11:44:06.203Z

Link: CVE-2026-7302

cve-icon Vulnrichment

Updated: 2026-05-18T14:05:30.334Z

cve-icon NVD

Status : Received

Published: 2026-05-18T12:16:16.600

Modified: 2026-05-18T15:16:27.063

Link: CVE-2026-7302

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T14:00:19Z

Weaknesses