SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.
Loading...
Loading...
Score 9.8 from GitHub Security Advisory (severity: CRITICAL) published 2026-05-18. NVD baseline CVSS 9.8; sources differ by 0.0.
SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.
May 18, 2026
May 19, 2026
These vendors published their own advisory mentioning this CVE — often with vendor-specific remediation steps + affected product lists not in NVD.
See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-7304
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.