AVID-2026-R1710
Description
vLLM has a Regular Expression Denial of Service (ReDoS, Exponential Complexity) Vulnerability in pythonic_tool_parser.py (CVE-2025-48887)
Details
vLLM, an inference and serving engine for large language models (LLMs), has a Regular Expression Denial of Service (ReDoS) vulnerability in the file vllm/entrypoints/openai/tool_parsers/pythonic_tool_parser.py of versions 0.6.4 up to but excluding 0.9.0. The root cause is the use of a highly complex and nested regular expression for tool call detection, which can be exploited by an attacker to cause severe performance degradation or make the service unavailable. The pattern contains multiple nested quantifiers, optional groups, and inner repetitions which make it vulnerable to catastrophic backtracking. Version 0.9.0 contains a patch for the issue.
Reason for inclusion in AVID: The AVID candidate is a software vulnerability (CVE-2025-48887) in vLLM’s tool parsing component, causing Regular Expression Denial of Service. It affects an AI serving framework used to deploy/run general-purpose AI systems, with potential exploitation via crafted input leading to denial of service. This is a software supply chain issue (a library/dependency used in AI stacks), not hardware/firmware. The report provides sufficient details (affected versions, root cause, patch, CVSS metrics).
References
- NVD entry
- https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25
- https://github.com/vllm-project/vllm/pull/18454
- https://github.com/vllm-project/vllm/commit/4fc1bf813ad80172c1db31264beaef7d93fe0601
Affected or Relevant Artifacts
- Developer: vllm-project
- Deployer: vllm-project
- Artifact Details:
| Type | Name |
|---|---|
| System | vllm |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| Base Score | 6.5 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | 🟢 Low |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | NONE |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-1333 | CWE-1333: Inefficient Regular Expression Complexity |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2025-05-30
- Version: 0.3.3
- AVID Entry