Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hvwj-8w5g-28rg | SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization |
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 16 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sglang
Sglang sglang |
|
| Vendors & Products |
Sglang
Sglang sglang |
Thu, 12 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script. | |
| Title | CVE-2026-3989 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-04-07T18:46:48.636Z
Reserved: 2026-03-11T16:41:06.512Z
Link: CVE-2026-3989
Updated: 2026-03-16T18:20:56.612Z
Status : Awaiting Analysis
Published: 2026-03-12T12:15:59.630
Modified: 2026-04-07T19:16:47.170
Link: CVE-2026-3989
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:49:53Z
No weakness.
Github GHSA