CVE-2026-3059: SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker
(updated )
SGLang’s multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication.
References
- github.com/advisories/GHSA-rgq9-fqf5-fv58
- github.com/sgl-project/sglang
- github.com/sgl-project/sglang/blob/main/python/sglang/multimodal_gen/runtime/scheduler_client.py
- github.com/sgl-project/sglang/pull/20904
- github.com/sgl-project/sglang/releases/tag/v0.5.10
- github.com/sgl-project/sglang/security/advisories/GHSA-3cp7-c6q2-94xr
- nvd.nist.gov/vuln/detail/CVE-2026-3059
- orca.security/resources/blog/sglang-llm-framework-rce-vulnerabilities
Code Behaviors & Features
Detect and mitigate CVE-2026-3059 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →