sglang@0.5.6.post2 vulnerabilities

SGLang is a fast serving framework for large language models and vision language models.

Direct Vulnerabilities

Known vulnerabilities in the sglang package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Deserialization of Untrusted Data

sglang is a SGLang is a fast serving framework for large language models and vision language models.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the use of the pickle.loads function. An attacker can execute arbitrary code by sending malicious serialized payloads to the exposed ZMQ REP socket, as received data is deserialized without authentication, message validation, or transport protection. This allows malicious pickle payloads to be executed immediately upon deserialization.

How to fix Deserialization of Untrusted Data?

There is no fixed version for sglang.

[0.5.5,)
  • C
Deserialization of Untrusted Data

sglang is a SGLang is a fast serving framework for large language models and vision language models.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the encode_receiver.py message handling logic in the encoder parallel disaggregation system. An attacker can execute arbitrary code by sending crafted payloads to the ZMQ socket when the encoder_transfer_backend zmq_to_scheduler option is enabled. The receiver binds to tcp://* and directly passes received data to pickle.loads() without authentication or validation, allowing malicious serialized objects to be deserialized and executed.

How to fix Deserialization of Untrusted Data?

There is no fixed version for sglang.

[0,)