CVE-2025-46560

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.8.0 and prior to 0.8.5 are affected by a critical performance vulnerability in the input preprocessing logic of the multimodal tokenizer. The code dynamically replaces placeholder tokens (e.g., <|audio_|>, <|image_|>) with repeated tokens based on precomputed lengths. Due to ​​inefficient list concatenation operations​​, the algorithm exhibits ​​quadratic time complexity (O(n²))​​, allowing malicious actors to trigger resource exhaustion via specially crafted inputs. This issue has been patched in version 0.8.5.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:*

History

28 May 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-30 01:15

Updated : 2025-05-28 19:15


NVD link : CVE-2025-46560

Mitre link : CVE-2025-46560

CVE.ORG link : CVE-2025-46560


JSON object : View

Products Affected

vllm

  • vllm
CWE
CWE-1333

Inefficient Regular Expression Complexity