vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.
{
"nvd_published_at": "2025-03-20T10:15:23Z",
"github_reviewed_at": "2025-03-21T16:55:37Z",
"severity": "CRITICAL",
"github_reviewed": true,
"cwe_ids": [
"CWE-502"
]
}