Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

SGLang CVE-2026-5760 (CVSS 9.8) enables RCE via a malicious GGUF model file

Deezer announces that 44% of songs uploaded to its platform each day are generated by AI

App host Vercel claims it was hacked and customer data stolen

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » SGLang CVE-2026-5760 (CVSS 9.8) enables RCE via a malicious GGUF model file
Identity

SGLang CVE-2026-5760 (CVSS 9.8) enables RCE via a malicious GGUF model file

By April 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 20, 2026Open source/server security

A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could lead to remote code execution on a susceptible system.

This vulnerability is tracked as CVE-2026-5760 and has a CVSS score of 9.8 out of 10.0. This is described as a case of command injection leading to the execution of arbitrary code.

SGLang is a high-performance open-source service framework for large-scale language and multimodal models. The official GitHub project has been forked over 5,500 times and starred 26,100 times.

According to the CERT Coordination Center (CERT/CC), this vulnerability affects the reranking endpoint ‘/v1/rerank’ and could allow an attacker to execute arbitrary code in the context of the SGLang service using a specially crafted GPT-Generated Unified Format (GGUF) model file.

“An attacker exploits this vulnerability by creating a malicious GPT Generation Uniform Format (GGUF) model file containing a crafted tokenizer.chat_template parameter that contains a Jinja2 Server Side Template Injection (SSTI) payload containing a trigger phrase that activates the vulnerable code path,” CERT/CC said in an advisory published today.

“The victim then downloads and loads the model in SGLang, and when the request reaches the “/v1/rerank” endpoint, the malicious template is rendered and the attacker’s arbitrary Python code is executed on the server. This sequence of events allows the attacker to perform remote code execution (RCE) on the SGLang server.”

According to security researcher Stuart Beck, who discovered and reported the flaw, the underlying problem stems from the use of jinja2.Environment() without a sandbox instead of ImmutableSandboxedEnvironment. This allows a malicious model to execute arbitrary Python code on the inference server.

The entire sequence of actions is:

The attacker creates a GGUF model file containing a malicious tokenizer.chat_template with a Jinja2 SSTI payload. The template contains a Qwen3 reranker trigger phrase that activates the vulnerable code path in ‘entrypoints/openai/serving_rerank.py’. Victims download and load models into SGLang from sources such as Hugging Face. When a request reaches the “/v1/rerank” endpoint, SGLang reads and renders the chat_template. SSTI payload runs arbitrary Python code on the server using jinja2.Environment()

It is worth noting that CVE-2026-5760 falls into the same vulnerability class as CVE-2024-34359 (also known as Llama Drama, CVSS score: 9.7), a critical flaw in the llama_cpp_python Python package that can lead to the execution of arbitrary code. The same attack surface was also fixed in vLLM late last year (CVE-2025-61620, CVSS score: 6.5).

“To mitigate this vulnerability, we recommend using ImmutableSandboxedEnvironment instead of jinja2.Environment() for rendering chat templates,” CERT/CC states. “This prevents arbitrary Python code from running on the server. No responses or patches were obtained during the reconciliation process.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDeezer announces that 44% of songs uploaded to its platform each day are generated by AI

Related Posts

Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

April 20, 2026

Why most AI deployments stop after the demo

April 20, 2026

Vulnerability in Anthropic MCP design allows RCE and threatens AI supply chain

April 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

SGLang CVE-2026-5760 (CVSS 9.8) enables RCE via a malicious GGUF model file

Deezer announces that 44% of songs uploaded to its platform each day are generated by AI

App host Vercel claims it was hacked and customer data stolen

Rivian factory hit by tornado before R2 launch

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.