CVE-2026-0599

HIGH

Pypi Text-generation < 3.3.7 - Denial of Service

Title source: rule
STIX 2.1

Description

A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Markdown image links and performs a blocking HTTP GET request, reading the entire response body into memory and cloning it before decoding. This behavior can lead to resource exhaustion, including network bandwidth saturation, memory inflation, and CPU overutilization. The vulnerability is triggered even if the request is later rejected for exceeding token limits. The default deployment configuration, which lacks memory usage limits and authentication, exacerbates the impact, potentially crashing the host machine. The issue is resolved in version 3.3.7.

Scores

CVSS v3 7.5
EPSS 0.0026
EPSS Percentile 49.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-400
Status published
Products (2)
huggingface/huggingface/text-generation-inference unspecified - 3.3.7
pypi/text-generation 0 - 3.3.7PyPI
Published Feb 02, 2026
Tracked Since Feb 18, 2026