


Perceptive Security
SOC/SIEM Consultancy

SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untr…
Published:
11 maart 2026 om 23:00:00
Alert date:
12 maart 2026 om 16:03:23
Source:
nvd.nist.gov
Emerging Technologies, Web Technologies
SGLang's encoder parallel disaggregation system contains a critical vulnerability that allows unauthenticated remote code execution. The vulnerability exists in the disaggregation module which uses pickle.loads() to deserialize untrusted data without proper authentication. This creates a significant security risk as attackers can potentially execute arbitrary code on affected systems. The vulnerability affects the encoder receiver component of the SGLang framework. The issue has been documented and analyzed by security researchers at Orca Security.
Technical details
Mitigation steps:
Affected products:
SGLang
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-3060
https://github.com/sgl-project/sglang/blob/main/python/sglang/srt/disaggregation/encode_receiver.py
https://orca.security/resources/blog/sglang-llm-framework-rce-vulnerabilities/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
