Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25960: CWE-918: Server-Side Request Forgery (SSRF) in vllm-project vllm

0
High
VulnerabilityCVE-2026-25960cvecve-2026-25960cwe-918
Published: Mon Mar 09 2026 (03/09/2026, 21:01:01 UTC)
Source: CVE Database V5
Vendor/Project: vllm-project
Product: vllm

Description

vLLM is an inference and serving engine for large language models (LLMs). The SSRF protection fix for CVE-2026-24779 add in 0.15.1 can be bypassed in the load_from_url_async method due to inconsistent URL parsing behavior between the validation layer and the actual HTTP client. The SSRF fix uses urllib3.util.parse_url() to validate and extract the hostname from user-provided URLs. However, load_from_url_async uses aiohttp for making the actual HTTP requests, and aiohttp internally uses the yarl library for URL parsing. This vulnerability in 0.17.0.

AI-Powered Analysis

AILast updated: 03/10/2026, 15:33:46 UTC

Technical Analysis

CVE-2026-25960 is a Server-Side Request Forgery (SSRF) vulnerability identified in the vllm-project's vllm inference and serving engine for large language models. The vulnerability specifically affects versions from 0.15.1 up to but not including 0.17.0. The root cause is a mismatch in URL parsing logic between the SSRF protection validation layer and the actual HTTP client used for requests. The SSRF fix introduced in version 0.15.1 uses urllib3.util.parse_url() to validate and extract hostnames from user-supplied URLs to prevent SSRF attacks. However, the load_from_url_async method, which performs asynchronous HTTP requests, uses aiohttp, which internally relies on the yarl library for URL parsing. Because urllib3 and yarl parse URLs differently, an attacker can craft malicious URLs that pass validation but cause aiohttp to request unintended internal or protected resources. This inconsistency effectively bypasses the SSRF protections, enabling attackers to make unauthorized HTTP requests from the server to internal systems or external endpoints. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), and the attack surface is network accessible (AV:N). The impact is primarily on confidentiality (C:H), as attackers can access sensitive internal services or data, with limited impact on availability (A:L) and no integrity impact (I:N). No public exploits have been reported yet, but the vulnerability is rated high severity with a CVSS score of 7.1. This vulnerability highlights the importance of consistent URL parsing and validation across all components handling user input in security-sensitive contexts.

Potential Impact

The SSRF vulnerability in vllm can have significant impacts on organizations deploying this software for large language model inference. Successful exploitation allows attackers to make arbitrary HTTP requests from the vulnerable server to internal or external systems, potentially accessing sensitive internal services, metadata endpoints, or private data not otherwise exposed. This can lead to data leakage, unauthorized information disclosure, and reconnaissance for further attacks. Since vllm is used in AI model serving, attackers might also leverage SSRF to access internal APIs or cloud metadata services, increasing the risk of credential theft or lateral movement. The vulnerability requires only low privileges and no user interaction, increasing the risk of automated exploitation if attackers gain limited access. Although no exploits are currently known in the wild, the high CVSS score and the critical nature of SSRF attacks mean organizations should treat this as a serious risk. The impact is especially pronounced in cloud environments or complex internal networks where SSRF can be a gateway to sensitive infrastructure components.

Mitigation Recommendations

To mitigate CVE-2026-25960, organizations should upgrade vllm to version 0.17.0 or later, where the SSRF bypass issue is resolved. If immediate upgrading is not feasible, organizations should implement strict network segmentation and egress filtering to limit the vulnerable server's ability to reach internal or sensitive endpoints. Additionally, applying application-layer firewall rules to restrict outbound HTTP requests from the vllm service can reduce exploitation risk. Developers should ensure consistent URL parsing libraries are used both for validation and actual HTTP requests to prevent discrepancies. Monitoring and logging HTTP requests made by vllm can help detect suspicious SSRF attempts. Finally, applying the principle of least privilege to the vllm service account and isolating it in a hardened environment reduces the potential damage of SSRF exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T17:13:54.066Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b03689ea502d3aa867a119

Added to database: 3/10/2026, 3:19:37 PM

Last enriched: 3/10/2026, 3:33:46 PM

Last updated: 3/10/2026, 7:17:55 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses