Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22778: CWE-532: Insertion of Sensitive Information into Log File in vllm-project vllm

0
Critical
VulnerabilityCVE-2026-22778cvecve-2026-22778cwe-532
Published: Mon Feb 02 2026 (02/02/2026, 21:09:53 UTC)
Source: CVE Database V5
Vendor/Project: vllm-project
Product: vllm

Description

CVE-2026-22778 is a critical vulnerability in vLLM versions 0. 8. 3 to before 0. 14. 1, an inference engine for large language models. When an invalid image is sent to its multimodal endpoint, an error leaks a heap address, drastically reducing ASLR effectiveness. This information disclosure can be chained with a heap overflow in the JPEG2000 decoder of OpenCV/FFmpeg to achieve remote code execution without authentication or user interaction. The vulnerability is fixed in version 0. 14. 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 11:09:16 UTC

Technical Analysis

CVE-2026-22778 is a critical security vulnerability affecting the vLLM inference and serving engine for large language models, specifically versions from 0.8.3 up to but not including 0.14.1. The vulnerability arises when an invalid image is submitted to the multimodal endpoint of vLLM. The Python Imaging Library (PIL) throws an error upon processing the invalid image, and vLLM returns this error message directly to the client. This error message includes a leaked heap address, which significantly reduces the effectiveness of Address Space Layout Randomization (ASLR) from approximately 4 billion possible guesses to about 8 guesses. This heap address leak (classified under CWE-532: Insertion of Sensitive Information into Log File) can be leveraged by attackers to bypass ASLR protections. The vulnerability can be chained with a heap overflow vulnerability in the JPEG2000 decoder used by OpenCV/FFmpeg libraries, enabling an attacker to achieve remote code execution (RCE) on the affected system. Notably, this attack requires no authentication or user interaction, making it highly exploitable remotely over the network. The vulnerability was publicly disclosed and assigned a CVSS v3.1 score of 9.8 (critical), reflecting its high impact on confidentiality, integrity, and availability. The issue was fixed in vLLM version 0.14.1, which prevents the heap address leak and mitigates the chaining exploit. No known exploits in the wild have been reported as of the publication date. The vulnerability affects organizations using vLLM for AI model inference, particularly those leveraging its multimodal capabilities that process images.

Potential Impact

For European organizations, the impact of CVE-2026-22778 is significant due to the critical nature of the vulnerability and the potential for remote code execution without authentication. Organizations deploying vLLM in AI research, development, or production environments risk full system compromise, data breaches, and service disruption. Confidentiality is at risk because heap address leaks can expose memory layout details, aiding further exploitation. Integrity and availability are also severely impacted as attackers can execute arbitrary code, potentially leading to data manipulation or denial of service. The vulnerability is particularly concerning for sectors relying on AI-powered services, including technology companies, research institutions, and enterprises integrating AI into their workflows. Given the increasing adoption of AI and multimodal models in Europe, the threat could disrupt critical AI infrastructure and erode trust in AI deployments. The lack of required authentication and user interaction increases the attack surface, enabling attackers to exploit vulnerable systems remotely and stealthily. The absence of known exploits in the wild currently offers a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Immediate upgrade of all vLLM deployments to version 0.14.1 or later, which contains the fix for the heap address leak and prevents the chaining exploit. 2. Implement strict input validation and sanitization on the multimodal endpoint to reject malformed or invalid images before processing, reducing error generation and information leakage. 3. Employ network-level protections such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) configured to detect and block suspicious payloads targeting the multimodal endpoint. 4. Monitor logs and network traffic for anomalous requests that could indicate exploitation attempts, focusing on invalid image submissions and error message patterns. 5. Restrict access to the multimodal endpoint to trusted networks or authenticated users where feasible, limiting exposure to untrusted sources. 6. Conduct regular security audits and penetration testing on AI inference services to identify and remediate similar vulnerabilities proactively. 7. Coordinate with AI software vendors and maintain up-to-date threat intelligence feeds to respond rapidly to emerging exploits related to AI model serving platforms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813004f9fa50a62f63a39d

Added to database: 2/2/2026, 11:15:16 PM

Last enriched: 2/10/2026, 11:09:16 AM

Last updated: 3/24/2026, 9:39:04 AM

Views: 662

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses