MAL-2026-844

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/vllm-plugins/MAL-2026-844.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-844
Published
2026-02-10T19:19:17Z
Modified
2026-02-10T20:14:00.928658Z
Summary
Malicious code in vllm-plugins (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (4fa0706d497278a502d158c89d51645a6f4e8187ca325aacaa59facccf542a03)

Generic campaign for all (likely) research / pentests, where the amount or art of collected data raises questions about the privacy, security and ethical side.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: GENERIC-questionable-pentest

Reasons (based on the campaign):

  • exfiltration-env-variables

  • exfiltration-generic

  • The package overrides the install command in setup.py to execute malicious code during installation.

  • typosquatting

Database specific
{
    "malicious-packages-origins": [
        {
            "id": "pypi/GENERIC-questionable-pentest/vllm-plugins",
            "sha256": "4fa0706d497278a502d158c89d51645a6f4e8187ca325aacaa59facccf542a03",
            "source": "kam193",
            "versions": [
                "99.99.99"
            ],
            "modified_time": "2026-02-10T19:19:17.108017Z",
            "import_time": "2026-02-10T19:54:11.777636522Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / vllm-plugins

Package

Affected ranges

Affected versions

99.*
99.99.99

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/vllm-plugins/MAL-2026-844.json"