CVE-2025-30165Deserialization of Untrusted Data in Vllm

Severity
8.0HIGHNVD
EPSS
1.3%
top 20.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 6

Description

vLLM is an inference and serving engine for large language models. In a multi-node vLLM deployment using the V0 engine, vLLM uses ZeroMQ for some multi-node communication purposes. The secondary vLLM hosts open a `SUB` ZeroMQ socket and connect to an `XPUB` socket on the primary vLLM host. When data is received on this `SUB` socket, it is deserialized with `pickle`. This is unsafe, as it can be abused to execute code on a remote machine. Since the vulnerability exists in a client that connects t

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.1 | Impact: 5.9

Affected Packages3 packages

PyPIvllm/vllm0.5.20.10.0
NVDvllm/vllm
CVEListV5vllm-project/vllm>= 0.5.2, <= 0.8.5.post1

🔴Vulnerability Details

2
OSV
Remote Code Execution Vulnerability in vLLM Multi-Node Cluster Configuration2025-05-06
GHSA
Remote Code Execution Vulnerability in vLLM Multi-Node Cluster Configuration2025-05-06

📋Vendor Advisories

1
Red Hat
vllm: Remote Code Execution Vulnerability in vLLM Multi-Node Cluster Configuration2025-05-06