CVE-2025-29783
Chainguard vulnerability analysis and mitigation

Overview

CVE-2025-29783 affects vLLM (versions >=0.6.5 and <0.8.0), a high-throughput and memory-efficient inference and serving engine for Large Language Models (LLMs). The vulnerability was discovered and disclosed on March 19, 2025, and involves unsafe deserialization in the Mooncake integration component (NVD, Security Advisory).

Technical details

The vulnerability stems from unsafe deserialization exposed directly over ZMQ/TCP on all network interfaces when vLLM is configured to use Mooncake. The core issue involves the use of pickle.loads() in the recv_tensor() function, which calls _recv_impl and passes raw network bytes to pickle.loads() for deserialization. The mooncake pipe is exposed over the network using ZMQ over TCP, with the interface defined as self.receiver_socket.connect(f"tcp://{d_host}:{d_rank_offset + 1}"). The vulnerability has received a CVSS v3.1 base score of 9.0 (Critical) (Security Advisory).

Impact

This vulnerability allows attackers to execute remote code on distributed hosts. The impact is particularly severe as it affects any deployments using Mooncake to distribute KV across distributed hosts. The vulnerability has been classified as critical due to its potential for remote code execution and the lack of network controls or authentication mechanisms to prevent arbitrary users from sending malicious payloads to the affected service (Security Advisory).

Mitigation and workarounds

The vulnerability has been fixed in vLLM version 0.8.0. The fix involves replacing the unsafe pickle serialization with safetensors in the Mooncake Pipe implementation. Users are strongly advised to upgrade to version 0.8.0 or later to address this security issue (GitHub Commit).

Community reactions

The vulnerability has garnered significant attention in the security community, particularly due to vLLM's popularity with over 43,000 stars on GitHub. The discovery prompted immediate action from the development team, resulting in a critical security patch (Security Online).

Additional resources


SourceThis report was generated using AI

Related Chainguard vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66001HIGH8.8
  • WolfiWolfi
  • neuvector
NoYesJan 08, 2026
CVE-2025-69262HIGH7.5
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2026-22028HIGH7.2
  • JavaScriptJavaScript
  • firefox-x11
NoYesJan 08, 2026
CVE-2025-68151MEDIUM6.6
  • WolfiWolfi
  • github.com/coredns/coredns
NoYesJan 08, 2026
CVE-2026-21895LOW2.7
  • RustRust
  • deno
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management