{
  "affected": [
    {
      "database_specific": {
        "unresolved_ranges": [
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "0.6.0"
              }
            ]
          }
        ]
      }
    }
  ],
  "details": "vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.",
  "id": "CVE-2024-9053",
  "modified": "2026-03-10T21:47:43.612249674Z",
  "published": "2025-03-20T10:15:46.327Z",
  "references": [
    {
      "type": "EVIDENCE",
      "url": "https://huntr.com/bounties/75a544f3-34a3-4da0-b5a3-1495cb031e09"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}