
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-46722 is a security vulnerability discovered in vLLM's MultiModalHasher class affecting versions 0.7.0 through 0.9.0. The vulnerability was disclosed on May 28, 2025, and affects the image hashing implementation in the vllm/multimodal/hasher.py file. The issue stems from improper serialization of PIL.Image.Image objects, where only raw pixel data is used without including critical metadata (GitHub Advisory).
The vulnerability exists in the MultiModalHasher.serialize_item method where PIL.Image.Image objects are serialized using only obj.tobytes(), which returns raw pixel data without including metadata such as image shape, dimensions, color mode, and format. This implementation can cause two images of different sizes (e.g., 30x100 and 100x30) with the same pixel byte sequence to generate identical hash values. The vulnerability has been assigned a CVSS v3.1 base score of 4.2 (Moderate) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L (GitHub Advisory).
The vulnerability can lead to hash collisions and incorrect cache hits in the system. Two images with different visual content but the same pixel byte sequence could be treated as identical, potentially resulting in incorrect responses and data leakage. The issue also affects video modality due to similar problems with numpy array sequencing, though audio processing remains unaffected due to librosa's automatic single-channel encoding (GitHub Advisory).
The vulnerability has been patched in vLLM version 0.9.0. The fix involves modifying the serialize_item method to include all critical metadata in the hash calculation, including dimensions, color mode, format, and the info dictionary. This is particularly important for palette-based images where the palette is stored in the info dictionary (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”