Miggo Logo

CVE-2025-29783: vLLM Allows Remote Code Execution via Mooncake Integration

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.748%
Published
3/19/2025
Updated
3/22/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
vllmpip

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unsafe pickle deserialization in Mooncake's network communication. The _recv_impl function directly passes raw network bytes to pickle.loads(), which is a well-known RCE vector (CWE-502). The _send_impl function's use of pickle.dumps() enables crafting malicious payloads. Both functions operate over ZMQ/TCP with insufficient network controls, as evidenced by the patch replacing pickle with safetensors in these exact locations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry W**n vLLM is *on*i*ur** to us* Moon**k*, uns*** **s*ri*liz*tion *xpos** *ir**tly ov*r ZMQ/T*P will *llow *tt**k*rs to *x**ut* r*mot* *o** on *istri*ut** *osts. ### **t*ils *. Pi*kl* **s*ri*liz*tion vuln*r**iliti*s *r* [w*ll *o*um*nt**](*

Reasoning

T** vuln*r**ility st*ms *rom uns*** pi*kl* **s*ri*liz*tion in Moon**k*'s n*twork *ommuni**tion. T** _r**v_impl *un*tion *ir**tly p*ss*s r*w n*twork *yt*s to pi*kl*.lo**s(), w*i** is * w*ll-known R** v**tor (*W*-***). T** _s*n*_impl *un*tion's us* o*