Vulnerability Description
SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.
CVSS Score
HIGH
References
- https://github.com/sgl-project/sglang/blob/main/scripts/playground/replay_reques
- https://github.com/sgl-project/sglang/pull/20904
- https://github.com/sgl-project/sglang/releases/tag/v0.5.10
- https://orca.security/resources/blog/sglang-llm-framework-rce-vulnerabilities/
FAQ
What is CVE-2026-3989?
CVE-2026-3989 is a vulnerability with a CVSS score of 7.8 (HIGH). SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will...
How severe is CVE-2026-3989?
CVE-2026-3989 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3989?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.