Bounties
Partners
Community
Info
vllm-project / vllm
Project repository
A high-throughput and memory-efficient inference and serving engine for LLMs
Submit a report
FIRST INTERACTION
WITHIN
13 DAYS
REVIEW
WITHIN
21 DAYS
FIX
WITHIN
N/A DAYS
Automated Safety Guardrail Bypass in Llama-3.1-8b-Instruct (Malware Generation)
Mar 30th 2026
s05161497-sudo
•
not applicable
Unauthenticated Denial of Service via Elastic Endpoint Scaling API
Mar 29th 2026
hacnho
•
duplicate
High
Unauthenticated Arbitrary Worker Method Execution via collective_rpc API
Mar 30th 2026
hacnho
•
not applicable
WebSocket KeyError in AuthenticationMiddleware breaks `/v1/realtime` when API ke...
Mar 27th 2026
vitocrl
•
not applicable
Unauthenticated server-wide DoS via `/scale_elastic_ep` auth bypass
Mar 26th 2026
vitocrl
•
duplicate
High
Authentication Bypass on Non-/v1 Endpoints Enables Unauthenticated Inference and...
Mar 27th 2026
0xbassia
•
not applicable
RCE via ungated cloudpickle.loads() in run_method() bypasses VLLM_ALLOW_INSECURE...
Mar 30th 2026
nhomyk
•
not applicable
Pre-Auth RCE via Unauthenticated Pickle Deserialization in Distributed Communic...
Mar 27th 2026
appsecguardian-hash
•
not applicable
Unsafe deserialization via torch.load and pickle in vLLM model loading
Mar 27th 2026
etwithin
•
spam
LoRA Adapter rank=0 ZeroDivisionError DoS in PEFTHelper — Validation Bypass via...
Mar 8th 2026
apeiria-zero
•
self closed
vLLM Unsafe Pickle Deserialization in /update_weights Endpoint — Unauthenticated...
Mar 27th 2026
avienma007
•
not applicable
Authentication Bypass via /invocations Endpoint in vLLM — Unauthorized Model Inf...
Feb 22nd 2026
nottiboy137
•
duplicate
Critical
Authentication Bypass for Non-/v1 Endpoints Exposes Tokenization and Server Conf...
Feb 22nd 2026
shima-coder
•
duplicate
Medium
NaN/Infinity Validation Bypass in SamplingParams via OpenAI-Compatible API
Feb 13th 2026
drrose2029
•
not applicable
Denial of Service via Unauthenticated /scale_elastic_ep Endpoint Setting Global...
Feb 13th 2026
seory0
•
not applicable
Authentication Bypass via Path Prefix Check in AuthenticationMiddleware Allowing...
Feb 13th 2026
seory0
•
not applicable
Path Traversal in LoRA Adapter Loading API Allows File Existence Oracle
Mar 26th 2026
222n5
•
not applicable
Remote Code Execution (RCE) via auto_map Dynamic Module Loading bypassing trust_...
Jan 30th 2026
amadhan882
•
not applicable
Remote Code Execution via Insecure Deserialization (pickle.loads/cloudpickle.loa...
Jan 22nd 2026
sermikr0
•
spam
Unhandled Memory Corruption Resulting in DDOS
Mar 8th 2026
kattraxler
•
pending
Remote code execution via transformers_utils/get_config
Feb 8th 2026
vancir
•
High
High
•
CVE-2026-4943
CVE-2026-4943
Remote code execution may occur through the calculate_expression tool helper in...
Oct 23rd 2025
dev-mhyun
•
not applicable
Undocumented Automatic Fallback to Unsafe Model Loading Creates Silent RCE Risk
Oct 14th 2025
rudra2018
•
informative
High
vLLM Server Unsafe Deserialization Leads to Arbitrary Code Execution
Mar 22nd 2025
racerz-fighting
•
not applicable
Remote Code Execution in Insecure Pickle Deserialization via recv_obj() in class...
Feb 20th 2025
seaw1nd
•
duplicate
Critical
vLLM Server Unsafe Deserialization Leads to Arbitrary Code Execution
Feb 1st 2025
avilum
•
informative
Critical
Remote Code Execution by Pickle Deserialization via MessageQueue.dequeue() Broad...
Dec 30th 2024
zpbrent
•
Critical
•
$1500
Critical
•
$1500
•
CVE-2024-11041
CVE-2024-11041
"POST /v1/completions" and "POST /v1/embeddings" Denials of Service
Dec 16th 2024
rh-tguittet
•
High
•
$750
High
•
$750
•
CVE-2024-11040
CVE-2024-11040
vllm has Cloudpickle deserializes arbitrary command execution
Dec 7th 2024
hexian2001
•
duplicate
Critical
Remote Code Execution by Pickle Deserialization via AsyncEngineRPCServer() RPC s...
Dec 6th 2024
zpbrent
•
Critical
•
$1500
Critical
•
$1500
•
CVE-2024-9053
CVE-2024-9053
Remote Code Execution by Pickle Deserialization via recv_object() distributed tr...
Dec 6th 2024
zpbrent
•
Critical
•
$1500
Critical
•
$1500
•
CVE-2024-9052
CVE-2024-9052
Command Injection in nccl_integrity_check function
Jun 12th 2024
vanirxxx
•
informative
High
Malicious model to RCE by torch.load in hf_model_weights_iterator (as well as th...
May 28th 2024
dogewatch
•
informative
Critical
CRITICAL
$0
HIGH
$0
MEDIUM
$0
LOW
$0