CVE-2026-3059
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication.
Analysis
SGLang's multimodal generation module deserializes untrusted data with pickle.loads() over an unauthenticated ZMQ broker, enabling remote code execution. Any attacker who can reach the ZMQ port can execute arbitrary Python code on the ML inference server.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all SGLang instances in production and development environments; isolate systems from untrusted networks and disable external access to the ZMQ broker port. Within 7 days: Implement network segmentation to restrict ZMQ broker access to trusted internal networks only; deploy WAF rules to block malicious deserialization payloads if exposed via HTTP proxy; consider disabling multimodal generation features if not critical to operations. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-rgq9-fqf5-fv58