Cyber Posture

CVE-2026-3060

CriticalPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0184 83.1th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly addresses the vulnerability by applying the SGLang v0.5.10 patch that fixes the unsafe pickle.loads() deserialization.

prevent

Information input validation prevents the disaggregation module from processing malicious serialized data by rejecting or sanitizing untrusted inputs prior to deserialization.

prevent

Access enforcement requires authentication before allowing data to the disaggregation module, blocking unauthenticated remote exploitation attempts.

Security SummaryAI

CVE-2026-3060 is an unauthenticated remote code execution vulnerability in SGLang's encoder parallel disaggregation system, specifically within the disaggregation module. The flaw arises from the module deserializing untrusted data using pickle.loads() without any authentication checks, corresponding to CWE-502 (Deserialization of Untrusted Data). Published on 2026-03-12, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and high impact on confidentiality, integrity, and availability.

An unauthenticated remote attacker with network access to the affected SGLang deployment can exploit the vulnerability by sending specially crafted serialized data to the disaggregation module. This triggers arbitrary code execution on the server with the privileges of the running process, potentially allowing full system compromise without requiring user interaction or privileges.

Mitigation guidance from available advisories recommends updating to SGLang version v0.5.10, which includes the fix as detailed in the release tag. The patching commit is available in pull request #20904 on the SGLang GitHub repository, and the vulnerable code is visible in encode_receiver.py. Further analysis is provided in the Orca Security blog post on SGLang LLM framework RCE vulnerabilities.

SGLang is an LLM framework, rendering this vulnerability relevant to AI/ML inference serving deployments where disaggregation features are enabled. No public information on real-world exploitation is available in the provided details.

Details

CWE(s)

Affected Products

lmsys
sglang
0.5.5 — 0.5.9

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote code execution via deserialization of untrusted data in a network-accessible disaggregation module of a public-facing LLM framework application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References