SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 18 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sglang
Sglang sglang |
|
| Weaknesses | CWE-502 | |
| Vendors & Products |
Sglang
Sglang sglang |
Mon, 18 May 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation. | |
| Title | CVE-2026-7304 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-05-18T10:39:52.696Z
Reserved: 2026-04-28T11:45:05.762Z
Link: CVE-2026-7304
No data.
Status : Received
Published: 2026-05-18T12:16:16.713
Modified: 2026-05-18T12:16:16.713
Link: CVE-2026-7304
No data.
OpenCVE Enrichment
Updated: 2026-05-18T13:30:06Z
Weaknesses