{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T03:16:27.735","vulnerabilities":[{"cve":{"id":"CVE-2026-3989","sourceIdentifier":"cret@cert.org","published":"2026-03-12T12:15:59.630","lastModified":"2026-04-07T19:16:47.170","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script."},{"lang":"es","value":"SGLangs 'replay_request_dump.py' contiene un pickle.load() inseguro sin validación y una deserialización adecuada. Un atacante puede aprovechar esto al proporcionar un archivo .pkl malicioso, lo que ejecutará el código del atacante en el dispositivo que ejecuta el script."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"references":[{"url":"https://github.com/sgl-project/sglang/blob/main/scripts/playground/replay_request_dump.py","source":"cret@cert.org"},{"url":"https://github.com/sgl-project/sglang/pull/20904","source":"cret@cert.org"},{"url":"https://github.com/sgl-project/sglang/releases/tag/v0.5.10","source":"cret@cert.org"},{"url":"https://orca.security/resources/blog/sglang-llm-framework-rce-vulnerabilities/","source":"cret@cert.org"}]}}]}