{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T10:23:20.766","vulnerabilities":[{"cve":{"id":"CVE-2026-24779","sourceIdentifier":"security-advisories@github.com","published":"2026-01-27T22:15:57.280","lastModified":"2026-01-30T14:41:25.530","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"vLLM is an inference and serving engine for large language models (LLMs). Prior to version 0.14.1, a Server-Side Request Forgery (SSRF) vulnerability exists in the `MediaConnector` class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods obtain and process media from URLs provided by users, using different Python parsing libraries when restricting the target host. These two parsing libraries have different interpretations of backslashes, which allows the host name restriction to be bypassed. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources. This vulnerability is particularly critical in containerized environments like `llm-d`, where a compromised vLLM pod could be used to scan the internal network, interact with other pods, and potentially cause denial of service or access sensitive data. For example, an attacker could make the vLLM pod send malicious requests to an internal `llm-d` management endpoint, leading to system instability by falsely reporting metrics like the KV cache state. Version 0.14.1 contains a patch for the issue."},{"lang":"es","value":"vLLM es un motor de inferencia y servicio para modelos de lenguaje grandes (LLM). Antes de la versión 0.14.1, existe una vulnerabilidad de falsificación de petición del lado del servidor (SSRF) en la clase 'MediaConnector' dentro del conjunto de características multimodales del proyecto vLLM. Los métodos load_from_url y load_from_url_async obtienen y procesan medios de URLs proporcionadas por los usuarios, utilizando diferentes librerías de análisis de Python al restringir el host de destino. Estas dos librerías de análisis tienen diferentes interpretaciones de las barras invertidas, lo que permite eludir la restricción del nombre de host. Esto permite a un atacante coaccionar al servidor vLLM para que realice peticiones arbitrarias a recursos de red internos. Esta vulnerabilidad es particularmente crítica en entornos contenerizados como 'llm-d', donde un pod vLLM comprometido podría usarse para escanear la red interna, interactuar con otros pods y potencialmente causar denegación de servicio o acceder a datos sensibles. Por ejemplo, un atacante podría hacer que el pod vLLM envíe peticiones maliciosas a un endpoint de gestión interno de 'llm-d', lo que llevaría a la inestabilidad del sistema al informar falsamente métricas como el estado de la caché KV. La versión 0.14.1 contiene un parche para el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:*","versionEndExcluding":"0.14.1","matchCriteriaId":"CCFA39AA-12B5-495B-8184-4B4136B710F1"}]}]}],"references":[{"url":"https://github.com/vllm-project/vllm/commit/f46d576c54fb8aeec5fc70560e850bed38ef17d7","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/vllm-project/vllm/pull/32746","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/vllm-project/vllm/security/advisories/GHSA-qh4c-xf7m-gxfc","source":"security-advisories@github.com","tags":["Exploit","Patch","Vendor Advisory"]}]}}]}