CVE-2025-29783: vLLM Allows Remote Code Execution via Mooncake Integration
9.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.748%
CWE
Published
3/19/2025
Updated
3/22/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| vllm | pip |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsafe pickle deserialization in Mooncake's network communication. The _recv_impl function directly passes raw network bytes to pickle.loads(), which is a well-known RCE vector (CWE-502). The _send_impl function's use of pickle.dumps() enables crafting malicious payloads. Both functions operate over ZMQ/TCP with insufficient network controls, as evidenced by the patch replacing pickle with safetensors in these exact locations.