Ad

CVE-2026-34753

MEDIUM CVSS 3.1: 5.4 EPSS 0.03%
Updated Apr 07, 2026
vLLM
Parameter Value
CVSS 5.4 (MEDIUM)
Affected Versions before 0.19.0
Fixed In 0.19.0
Type CWE-918 (Server-Side Request Forgery (SSRF))
Vendor vLLM
Public PoC No

vLLM is an inference and serving engine for large language models (LLMs). From 0.16.0 to before 0.19.0, a server-side request forgery (SSRF) vulnerability in download_bytes_from_url allows any actor who can control batch input JSON to make the vLLM batch runner issue arbitrary HTTP/HTTPS requests from the server, without any URL validation or domain restrictions. This can be used to target internal services (e.g. cloud metadata endpoints or internal HTTP APIs) reachable from the vLLM host.

This vulnerability is fixed in 0.19.0.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
None
No data modification
Availability
Low
Partial disruption

CVSS Vector v3.1