PyPI: sglang

CVE-2026-3060

Safety vulnerability ID: SFTY-20260312-28803

Safety legacy ID: pyup.io-89030

Affected versions of the sglang package are vulnerable to Deserialization of Untrusted Data due to unsafe deserialization of attacker-controlled data with Python pickle. In python/sglang/srt/disaggregation/encode_receiver.py, the _try_recv_mm_data and _recv_mm_data methods call pickle.loads(parts[0]) on data received through the disaggregation module’s messaging flow without authentication or validation, allowing untrusted objects to be reconstructed from network input.

Created at: Mar 27, 2026Updated at: Mar 27, 2026

Overview

SGLang's encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module

Advisory

Affected versions of the sglang package are vulnerable to Deserialization of Untrusted Data due to unsafe deserialization of attacker-controlled data with Python pickle. In python/sglang/srt/disaggregation/encode_receiver.py, the _try_recv_mm_data and _recv_mm_data methods call pickle.loads(parts[0]) on data received through the disaggregation module’s messaging flow without authentication or validation, allowing untrusted objects to be reconstructed from network input.

Affected Package

Affecting sglang package, versions
<=0.5.9

Also affects

---

How to Fix

Upgrade
sglang
to
0.5.10rc0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more