CVE-2026-22807Code Injection in Vllm

Severity
9.8CRITICALNVD
GHSA8.8OSV8.8
EPSS
0.0%
top 93.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 21
Latest updateMar 27

Description

vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.14.0, vLLM loads Hugging Face `auto_map` dynamic modules during model resolution without gating on `trust_remote_code`, allowing attacker-controlled Python code in a model repo/path to execute at server startup. An attacker who can influence the model repo/path (local directory or remote Hugging Face repo) can achieve arbitrary code execution on the vLLM host during model l

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDvllm/vllm0.10.10.14.0
PyPIvllm/vllm0.10.10.14.0+1
CVEListV5vllm-project/vllm>= 0.10.1, < 0.14.0

Patches

🔴Vulnerability Details

4
OSV
vLLM has Hardcoded Trust Override in Model Files Enables RCE Despite Explicit User Opt-Out2026-03-27
GHSA
vLLM has Hardcoded Trust Override in Model Files Enables RCE Despite Explicit User Opt-Out2026-03-27
GHSA
vLLM affected by RCE via auto_map dynamic module loading during model initialization2026-01-21
OSV
vLLM affected by RCE via auto_map dynamic module loading during model initialization2026-01-21

📋Vendor Advisories

1
Red Hat
vLLM: vLLM: Arbitrary code execution via untrusted model loading2026-01-21

🕵️Threat Intelligence

1
Wiz
CVE-2026-22807 Impact, Exploitability, and Mitigation Steps | Wiz