vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.
CVE ID: CVE-2024-11041
CVSS Base Severity: CRITICAL
CVSS Base Score: 9.8
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor: vllm-project
Product: vllm-project/vllm
EPSS Score: 0.33% (probability of being exploited)
EPSS Percentile: 54.83% (scored less or equal to compared to others)
EPSS Date: 2025-04-18 (when was this score calculated)