CVE-2025-48943

vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 up to but excluding 0.9.0 have a Denial of Service (ReDoS) that causes the vLLM server to crash if an invalid regex was provided while using structured output. This vulnerability is similar to GHSA-6qc9-v4r8-22xg/CVE-2025-48942, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:*

History

24 Jun 2025, 17:40

Type Values Removed Values Added
CPE cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:*
First Time Vllm vllm
Vllm
References () https://github.com/vllm-project/vllm/commit/08bf7840780980c7568c573c70a6a8db94fd45ff - () https://github.com/vllm-project/vllm/commit/08bf7840780980c7568c573c70a6a8db94fd45ff - Patch
References () https://github.com/vllm-project/vllm/issues/17313 - () https://github.com/vllm-project/vllm/issues/17313 - Issue Tracking
References () https://github.com/vllm-project/vllm/pull/17623 - () https://github.com/vllm-project/vllm/pull/17623 - Issue Tracking, Patch
References () https://github.com/vllm-project/vllm/security/advisories/GHSA-9hcf-v7m4-6m2j - () https://github.com/vllm-project/vllm/security/advisories/GHSA-9hcf-v7m4-6m2j - Vendor Advisory
Summary
  • (es) vLLM es un motor de inferencia y servicio para modelos de lenguaje grandes (LLM). Las versiones 0.8.0 y 0.9.0, excepto esta, presentan una vulnerabilidad de denegación de servicio (ReDoS) que provoca el bloqueo del servidor vLLM si se proporciona una expresión regular no válida al usar la salida estructurada. Esta vulnerabilidad es similar a GHSA-6qc9-v4r8-22xg/CVE-2025-48942, pero para expresiones regulares en lugar de un esquema JSON. La versión 0.9.0 corrige el problema.

30 May 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-30 19:15

Updated : 2025-06-24 17:40


NVD link : CVE-2025-48943

Mitre link : CVE-2025-48943

CVE.ORG link : CVE-2025-48943


JSON object : View

Products Affected

vllm

  • vllm
CWE
CWE-248

Uncaught Exception