CVE-2025-48956Uncontrolled Resource Consumption in Vllm

Severity
7.5HIGHNVD
EPSS
0.3%
top 49.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 21
Latest updateAug 26

Description

vLLM is an inference and serving engine for large language models (LLMs). From 0.1.0 to before 0.10.1.1, a Denial of Service (DoS) vulnerability can be triggered by sending a single HTTP GET request with an extremely large header to an HTTP endpoint. This results in server memory exhaustion, potentially leading to a crash or unresponsiveness. The attack does not require authentication, making it exploitable by any remote user. This vulnerability is fixed in 0.10.1.1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDvllm/vllm0.1.00.10.1.1
PyPIvllm/vllm0.1.00.10.1.1
CVEListV5vllm-project/vllm>= 0.1.0, < 0.10.1.1

Patches

🔴Vulnerability Details

2
OSV
vllm API endpoints vulnerable to Denial of Service Attacks2025-08-21
GHSA
vllm API endpoints vulnerable to Denial of Service Attacks2025-08-21

📋Vendor Advisories

1
Red Hat
vllm: HTTP header size limit not enforced allows Denial of Service from Unauthenticated requests2025-08-26