Server-Side Request Forgery Vulnerability in vLLM by vLLM Project
CVE-2026-24779
What is CVE-2026-24779?
The vLLM inference and serving engine has a vulnerability in the MediaConnector class affecting its multimodal feature set. The issue arises from the load_from_url and load_from_url_async methods, which process user-provided URLs. Variances in how two Python parsing libraries interpret backslashes enable attackers to bypass host restrictions. This allows malicious parties to trick the vLLM server into making unauthorized requests to internal resources, posing risks especially in containerized setups like llm-d. Consequently, a compromised vLLM pod could scan the internal network, communicate with other pods, leading to potential denial of service and unauthorized access to sensitive data. Version 0.14.1 addresses this critical issue.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
vllm < 0.14.1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
