CVE-2025-32444Deserialization of Untrusted Data in Vllm

Severity
9.8CRITICALNVD
EPSS
2.5%
top 14.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 30

Description

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDvllm/vllm0.6.50.8.5
PyPIvllm/vllm0.6.50.8.5+1
CVEListV5vllm-project/vllm>= 0.6.5, < 0.8.5

Patches

🔴Vulnerability Details

3
OSV
CVE-2025-32444: vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs2025-04-30
OSV
vLLM Vulnerable to Remote Code Execution via Mooncake Integration2025-04-29
GHSA
vLLM Vulnerable to Remote Code Execution via Mooncake Integration2025-04-29

📋Vendor Advisories

1
Red Hat
vllm: vLLM Vulnerable to Remote Code Execution via Mooncake Integration2025-04-30