PyPI: sglang

CVE-2026-3989

Safety vulnerability ID: SFTY-20260312-70919

Safety legacy ID: pyup.io-89029

Affected versions of the sglang package are vulnerable to Deserialization of Untrusted Data due to unsafe loading of attacker-controlled pickle files. Specifically, the scripts/playground/replay_request_dump.py script uses pickle.load() on .pkl input without validating that the deserialized content is safe or expected, allowing arbitrary Python objects to be reconstructed.

Created at: Mar 27, 2026Updated at: Mar 27, 2026

Overview

SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization

Advisory

Affected versions of the sglang package are vulnerable to Deserialization of Untrusted Data due to unsafe loading of attacker-controlled pickle files. Specifically, the scripts/playground/replay_request_dump.py script uses pickle.load() on .pkl input without validating that the deserialized content is safe or expected, allowing arbitrary Python objects to be reconstructed.

Affected Package

Affecting sglang package, versions
<=0.5.9

Also affects

---

How to Fix

Upgrade
sglang
to
0.5.10rc0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more