Vulnerability Description
vLLM is an inference and serving engine for large language models (LLMs). In version 0.8.0 up to but excluding 0.9.0, the vLLM backend used with the /v1/chat/completions OpenAPI endpoint fails to validate unexpected or malformed input in the "pattern" and "type" fields when the tools functionality is invoked. These inputs are not validated before being compiled or parsed, causing a crash of the inference worker with a single request. The worker will remain down until it is restarted. Version 0.9.0 fixes the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vllm | Vllm | >= 0.8.0, < 0.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/vllm-project/vllm/pull/17623Issue TrackingVendor Advisory
- https://github.com/vllm-project/vllm/security/advisories/GHSA-vrq3-r879-7m65ExploitVendor Advisory
FAQ
What is CVE-2025-48944?
CVE-2025-48944 is a vulnerability with a CVSS score of 6.5 (MEDIUM). vLLM is an inference and serving engine for large language models (LLMs). In version 0.8.0 up to but excluding 0.9.0, the vLLM backend used with the /v1/chat/completions OpenAPI endpoint fails to vali...
How severe is CVE-2025-48944?
CVE-2025-48944 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-48944?
Check the references section above for vendor advisories and patch information. Affected products include: Vllm Vllm.