Platform
python
Component
sglang
Fixed in
0.5.11
0.5.10
CVE-2026-3060 describes a critical Remote Code Execution (RCE) vulnerability discovered in SGLang, a Python encoder. This flaw allows unauthenticated attackers to execute arbitrary code on vulnerable systems by exploiting insecure deserialization within the disaggregation module. The vulnerability impacts SGLang versions 0.5.9 and earlier; upgrading to version 0.5.10 resolves the issue.
The impact of CVE-2026-3060 is severe due to its unauthenticated nature and the potential for remote code execution. An attacker can exploit this vulnerability to gain complete control over a vulnerable system, potentially leading to data breaches, system compromise, and further lateral movement within the network. The lack of authentication significantly lowers the barrier to entry for attackers, making this a high-priority vulnerability to address. This vulnerability shares similarities with other pickle deserialization vulnerabilities where untrusted data is processed without proper validation, potentially allowing for arbitrary code execution.
CVE-2026-3060 was publicly disclosed on 2026-03-12. The vulnerability's severity is high due to the ease of exploitation and potential impact. Public proof-of-concept (PoC) code is likely to emerge quickly given the vulnerability's nature. It is not currently listed on the CISA KEV catalog, but its criticality warrants monitoring. Active exploitation campaigns are possible, especially if readily available PoCs are published.
Exploit Status
EPSS
0.66% (71% percentile)
CVSS Vector
The primary mitigation for CVE-2026-3060 is to immediately upgrade SGLang to version 0.5.10 or later. If upgrading is not immediately feasible due to compatibility issues or system downtime concerns, consider implementing temporary workarounds. While a direct WAF rule is unlikely to be effective due to the nature of the deserialization process, carefully scrutinizing network traffic for unusual patterns associated with SGLang's disaggregation module might provide some early detection. Review and restrict access to the disaggregation module if possible. After upgrading, confirm the fix by attempting to trigger the deserialization process with a known malicious payload – it should now be rejected.
Update to a patched version of SGLang that implements input validation and avoids insecure deserialization of untrusted data with pickle.loads(). Consider using safer serialization methods or implementing authentication measures to protect the disaggregation module.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-3060 is a critical Remote Code Execution (RCE) vulnerability in SGLang versions up to 0.5.9, allowing attackers to execute arbitrary code through insecure deserialization.
You are affected if you are using SGLang version 0.5.9 or earlier. Check your installed version and upgrade immediately.
Upgrade SGLang to version 0.5.10 or later to resolve the vulnerability. If immediate upgrade is not possible, consider temporary workarounds like restricting access to the disaggregation module.
While no active exploitation has been confirmed, the vulnerability's ease of exploitation makes it likely that it will be targeted, especially with the public disclosure.
Refer to the SGLang project's official website or GitHub repository for the latest security advisories and updates related to CVE-2026-3060.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.