Home

Description

SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.

PUBLISHED Reserved 2026-04-28 | Published 2026-05-18 | Updated 2026-05-18 | Assigner certcc

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

5.10
affected

References

github.com/sgl-project/sglang/tree/main/python/sglang

antiproof.ai/blog/three-rces-in-sglang/

cve.org (CVE-2026-7304)

nvd.nist.gov (CVE-2026-7304)

Download JSON