Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25048: CWE-674: Uncontrolled Recursion in mlc-ai xgrammar

0
High
VulnerabilityCVE-2026-25048cvecve-2026-25048cwe-674
Published: Thu Mar 05 2026 (03/05/2026, 15:34:42 UTC)
Source: CVE Database V5
Vendor/Project: mlc-ai
Product: xgrammar

Description

xgrammar is an open-source library for efficient, flexible, and portable structured generation. Prior to version 0.1.32, the multi-level nested syntax caused a segmentation fault (core dumped). This issue has been patched in version 0.1.32.

AI-Powered Analysis

AILast updated: 03/05/2026, 17:51:29 UTC

Technical Analysis

CVE-2026-25048 is a vulnerability identified in the mlc-ai xgrammar library, an open-source tool designed for efficient, flexible, and portable structured generation. The root cause is uncontrolled recursion triggered by multi-level nested syntax constructs in versions prior to 0.1.32. This uncontrolled recursion leads to a segmentation fault, causing the application to crash and dump core, effectively resulting in a denial-of-service (DoS) condition. The vulnerability is classified under CWE-674, which pertains to uncontrolled recursion issues that can exhaust stack memory. The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N), making it remotely exploitable. The impact is primarily on availability (VA:H), with no confidentiality or integrity impact. The vulnerability was reserved in January 2026 and published in March 2026, with a patch released in version 0.1.32 of xgrammar. No known exploits have been reported in the wild, but the ease of triggering the fault makes it a significant risk for affected systems. The vulnerability affects any software or service that integrates the vulnerable xgrammar versions, especially those processing complex nested syntax structures in AI or language generation contexts.

Potential Impact

The primary impact of CVE-2026-25048 is a denial-of-service condition caused by application crashes due to segmentation faults. Organizations using vulnerable versions of xgrammar in AI, natural language processing, or structured generation applications may experience service outages, degraded performance, or system instability. This can disrupt business operations, especially in environments relying on automated language generation or AI-driven workflows. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can cause widespread disruption with minimal effort. The lack of confidentiality or integrity impact limits data breach risks, but availability loss can affect customer trust, operational continuity, and potentially lead to financial losses. Industries heavily dependent on AI tooling, such as technology companies, research institutions, and cloud service providers, face higher operational risks. Additionally, embedded or integrated systems using xgrammar may become unstable, complicating incident response and recovery.

Mitigation Recommendations

To mitigate CVE-2026-25048, organizations should immediately upgrade all instances of the mlc-ai xgrammar library to version 0.1.32 or later, where the uncontrolled recursion issue has been patched. Developers should audit their codebases and dependencies to identify any use of vulnerable xgrammar versions, including transitive dependencies in AI or language processing pipelines. Implement input validation and limit the depth of nested syntax structures where feasible to reduce the risk of triggering recursion faults. Employ runtime monitoring and anomaly detection to identify unusual crashes or segmentation faults related to xgrammar usage. In environments where immediate upgrading is not possible, consider isolating or sandboxing applications using xgrammar to contain potential crashes and prevent cascading failures. Maintain up-to-date backups and incident response plans to quickly recover from denial-of-service incidents. Finally, track vendor advisories and community updates for any emerging exploit information or additional patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.886Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9c05f460e1c85df0c5c4d

Added to database: 3/5/2026, 5:41:51 PM

Last enriched: 3/5/2026, 5:51:29 PM

Last updated: 3/5/2026, 10:18:22 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses