SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lmsys
Lmsys sglang |
|
| CPEs | cpe:2.3:a:lmsys:sglang:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lmsys
Lmsys sglang |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sglang
Sglang sglang |
|
| Vendors & Products |
Sglang
Sglang sglang |
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Thu, 12 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication. | |
| Title | CVE-2026-3060 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published: 2026-03-12T11:37:37.009Z
Updated: 2026-03-12T14:21:19.594Z
Reserved: 2026-02-23T18:17:34.976Z
Link: CVE-2026-3060
Updated: 2026-03-12T14:19:27.200Z
Status : Analyzed
Published: 2026-03-12T12:15:59.530
Modified: 2026-03-17T14:20:12.630
Link: CVE-2026-3060
No data.
ReportizFlow