CVE-2024-11041
CRITICALVllm - Insecure Deserialization
Title source: ruleDescription
vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.
Scores
CVSS v3
9.8
EPSS
0.0125
EPSS Percentile
79.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (2)
vllm/vllm
pypi/vllm
PyPI
Timeline
Published
Mar 20, 2025
Tracked Since
Feb 18, 2026