CVE-2026-22778

Source
https://cve.org/CVERecord?id=CVE-2026-22778
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22778.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-22778
Aliases
Published
2026-02-02T21:09:53.265Z
Modified
2026-02-04T21:33:47.834464Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
vLLM leaks a heap address when PIL throws an error
Details

vLLM is an inference and serving engine for large language models (LLMs). From 0.8.3 to before 0.14.1, when an invalid image is sent to vLLM's multimodal endpoint, PIL throws an error. vLLM returns this error to the client, leaking a heap address. With this leak, we reduce ASLR from 4 billion guesses to ~8 guesses. This vulnerability can be chained a heap overflow with JPEG2000 decoder in OpenCV/FFmpeg to achieve remote code execution. This vulnerability is fixed in 0.14.1.

Database specific
{
    "cwe_ids": [
        "CWE-532"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22778.json"
}
References

Affected packages

Git / github.com/vllm-project/vllm

Affected ranges

Type
GIT
Repo
https://github.com/vllm-project/vllm
Events

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22778.json"