Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jx93-g359-86wm | SGLang's encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module |
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 17 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lmsys
Lmsys sglang |
|
| CPEs | cpe:2.3:a:lmsys:sglang:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lmsys
Lmsys sglang |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sglang
Sglang sglang |
|
| Vendors & Products |
Sglang
Sglang sglang |
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Thu, 12 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication. | |
| Title | CVE-2026-3060 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-04-07T18:45:35.370Z
Reserved: 2026-02-23T18:17:34.976Z
Link: CVE-2026-3060
Updated: 2026-03-12T14:19:27.200Z
Status : Modified
Published: 2026-03-12T12:15:59.530
Modified: 2026-04-07T19:16:47.007
Link: CVE-2026-3060
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:49:54Z
Github GHSA