CVE-2025-48942

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48942
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48942.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-48942
Aliases
Related
Published
2025-05-30T18:33:40Z
Modified
2025-10-14T14:34:40Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
vLLM DOS: Remotely kill vllm over http with invalid JSON schema
Details

vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8.0 up to but excluding 0.9.0, hitting the /v1/completions API with a invalid json_schema as a Guided Param kills the vllm server. This vulnerability is similar GHSA-9hcf-v7m4-6m2j/CVE-2025-48943, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue.

References

Affected packages

Git / github.com/vllm-project/vllm

Affected ranges

Type
GIT
Repo
https://github.com/vllm-project/vllm
Events