Description
SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.
Problem types
CWE-502: Deserialization of Untrusted Data
Product status
References
github.com/...main/scripts/playground/replay_request_dump.py
orca.security/...g/sglang-llm-framework-rce-vulnerabilities/
github.com/sgl-project/sglang/releases/tag/v0.5.10
github.com/sgl-project/sglang/pull/20904