Skip to main content

CVE-2025-10164: Deserialization in lmsys sglang

Medium
VulnerabilityCVE-2025-10164cvecve-2025-10164
Published: Tue Sep 09 2025 (09/09/2025, 18:32:06 UTC)
Source: CVE Database V5
Vendor/Project: lmsys
Product: sglang

Description

A security flaw has been discovered in lmsys sglang 0.4.6. Affected by this vulnerability is the function main of the file /update_weights_from_tensor. The manipulation of the argument serialized_named_tensors results in deserialization. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/09/2025, 18:42:36 UTC

Technical Analysis

CVE-2025-10164 is a deserialization vulnerability identified in version 0.4.6 of the lmsys sglang software, specifically within the function 'main' of the file '/update_weights_from_tensor'. The vulnerability arises from improper handling of the 'serialized_named_tensors' argument, which is deserialized without sufficient validation or sanitization. This flaw allows an attacker to remotely supply crafted serialized data that, when deserialized by the vulnerable function, can lead to arbitrary code execution or other malicious outcomes. The vulnerability is exploitable remotely without requiring authentication or user interaction, increasing its risk profile. Although the vendor was notified early, there has been no response or patch released to date. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is rated low individually but collectively significant enough to warrant attention. The exploit code has been publicly released, increasing the likelihood of exploitation, although no confirmed in-the-wild attacks have been reported yet. The vulnerability affects only version 0.4.6 of sglang, so organizations using this specific version are at risk. Deserialization vulnerabilities are particularly dangerous because they can lead to remote code execution, data tampering, or denial of service depending on the deserialized payload and application context. Given the lack of vendor response, organizations must proactively address this issue.

Potential Impact

For European organizations, the impact of CVE-2025-10164 can be substantial if they rely on lmsys sglang 0.4.6 in their software stacks, particularly in environments processing serialized tensor data remotely. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to data breaches, system compromise, or service disruption. This could affect confidentiality by exposing sensitive data, integrity by allowing unauthorized data manipulation, and availability by causing crashes or denial of service. Sectors such as research institutions, AI/ML development companies, and technology firms using sglang for tensor operations may be particularly vulnerable. The public availability of exploit code increases the risk of opportunistic attacks, including by cybercriminals or state-sponsored actors targeting European entities. The absence of a vendor patch means organizations must rely on mitigation strategies to reduce exposure. Failure to address this vulnerability could result in regulatory consequences under GDPR if personal data is compromised, as well as reputational damage and operational downtime.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement the following specific mitigations: 1) Immediately audit and inventory all deployments of lmsys sglang to identify instances running version 0.4.6. 2) Where possible, upgrade to a later, patched version once available or consider downgrading if earlier versions are not vulnerable. 3) Implement network-level controls to restrict access to the vulnerable '/update_weights_from_tensor' functionality, limiting exposure to trusted networks or IP addresses only. 4) Employ application-layer input validation and filtering to detect and block suspicious serialized payloads before deserialization. 5) Use runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to monitor for anomalous behavior indicative of exploitation attempts. 6) Consider sandboxing or isolating the sglang process to contain potential compromise. 7) Monitor threat intelligence feeds for any emerging exploit activity and update defenses accordingly. 8) Prepare incident response plans specifically addressing potential exploitation of deserialization vulnerabilities. These targeted steps go beyond generic advice by focusing on access restriction, input validation, and monitoring tailored to the vulnerable component and attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-09T13:23:20.560Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0749c2bd84bebdc41b969

Added to database: 9/9/2025, 6:40:28 PM

Last enriched: 9/9/2025, 6:42:36 PM

Last updated: 9/9/2025, 6:42:36 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats