vLLM is an inference and serving engine for large language models (LLMs). From 0.1.0 to before 0.10.1.1, a Denial of Service (DoS) vulnerability can be triggered by sending a single HTTP GET request with an extremely large header to an HTTP endpoint. This results in server memory exhaustion, potentially leading to a crash or unresponsiveness. The attack does not require authentication, making it exploitable by any remote user. This vulnerability is fixed in 0.10.1.1.
References
Link | Resource |
---|---|
https://github.com/vllm-project/vllm/commit/d8b736f913a59117803d6701521d2e4861701944 | Patch |
https://github.com/vllm-project/vllm/pull/23267 | Issue Tracking Patch |
https://github.com/vllm-project/vllm/security/advisories/GHSA-rxc4-3w6r-4v47 | Vendor Advisory |
Configurations
History
09 Oct 2025, 18:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:* | |
References | () https://github.com/vllm-project/vllm/commit/d8b736f913a59117803d6701521d2e4861701944 - Patch | |
References | () https://github.com/vllm-project/vllm/pull/23267 - Issue Tracking, Patch | |
References | () https://github.com/vllm-project/vllm/security/advisories/GHSA-rxc4-3w6r-4v47 - Vendor Advisory | |
First Time |
Vllm vllm
Vllm |
22 Aug 2025, 18:09
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-21 15:15
Updated : 2025-10-09 18:04
NVD link : CVE-2025-48956
Mitre link : CVE-2025-48956
CVE.ORG link : CVE-2025-48956
JSON object : View
Products Affected
vllm
- vllm
CWE
CWE-400
Uncontrolled Resource Consumption