๐Ÿ” CVE Alert

CVE-2026-7304

CRITICAL 9.8

CVE-2026-7304

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.

Vendor sglang
Product sglang
Published May 18, 2026
Last Updated May 18, 2026
Stay Ahead of the Next One

Get instant alerts for sglang sglang

Be the first to know when new critical vulnerabilities affecting sglang sglang are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

SGLang / SGLang
5.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/sgl-project/sglang/tree/main/python/sglang antiproof.ai: https://antiproof.ai/blog/three-rces-in-sglang/