vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.
{ "nvd_published_at": "2025-03-20T10:15:23Z", "github_reviewed": true, "github_reviewed_at": "2025-03-21T16:55:37Z", "severity": "CRITICAL", "cwe_ids": [ "CWE-502" ] }