CVE-2025-62372Improper Validation of Array Index in Vllm

Severity
8.3HIGHNVD
EPSS
0.1%
top 81.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 21

Description

vLLM is an inference and serving engine for large language models (LLMs). From version 0.5.5 to before 0.11.1, users can crash the vLLM engine serving multimodal models by passing multimodal embedding inputs with correct ndim but incorrect shape (e.g. hidden dimension is wrong), regardless of whether the model is intended to support such inputs (as defined in the Supported Models page). This issue has been patched in version 0.11.1.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H

Affected Packages3 packages

NVDvllm/vllm0.5.50.11.1+1
PyPIvllm/vllm0.5.50.11.1
CVEListV5vllm-project/vllm>= 0.5.5, < 0.11.1

Patches

🔴Vulnerability Details

2
GHSA
vLLM vulnerable to DoS with incorrect shape of multimodal embedding inputs2025-11-20
OSV
vLLM vulnerable to DoS with incorrect shape of multimodal embedding inputs2025-11-20

📋Vendor Advisories

1
Red Hat
vllm: vLLM vulnerable to DoS with incorrect shape of multimodal embedding inputs2025-11-21