Home » Database

AVID-2026-R1678

Description

vLLM Allows Remote Code Execution via Mooncake Integration (CVE-2025-29783)

Details

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. When vLLM is configured to use Mooncake, unsafe deserialization exposed directly over ZMQ/TCP on all network interfaces will allow attackers to execute remote code on distributed hosts. This is a remote code execution vulnerability impacting any deployments using Mooncake to distribute KV across distributed hosts. This vulnerability is fixed in 0.8.0.

Reason for inclusion in AVID: The CVE-2025-29783 entry describes a remote code execution vulnerability in vLLM caused by unsafe deserialization over Mooncake integration via ZMQ/TCP. This directly concerns AI software stacks (model serving/deployment) and affects components used to build/run general-purpose AI systems. It is a security vulnerability (RCE) with explicit exploitation potential and CVE/NVD references provide evidence. Therefore it meets all AVID criteria for inclusion in AI supply chain curation.

References

Affected or Relevant Artifacts

  • Developer: vllm-project
  • Deployer: vllm-project
  • Artifact Details:
TypeName
Systemvllm

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Base Score9.1
Base Severity🔴 Critical
Attack VectorADJACENT_NETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-502CWE-502: Deserialization of Untrusted Data

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-19
  • Version: 0.3.3
  • AVID Entry