vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.
CVE ID: CVE-2024-9053
CVSS Base Severity: CRITICAL
CVSS Base Score: 9.8
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor: vllm-project
Product: vllm-project/vllm
EPSS Score: 0.29% (probability of being exploited)
EPSS Percentile: 52.01% (scored less or equal to compared to others)
EPSS Date: 2025-04-18 (when was this score calculated)