Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. sglang
  4. ›
  5. CVE-2025-10164

CVE-2025-10164: SGLang Remote Code Execution Vulnerability via Unsafe Deserialization in update_weights_from_tensor

September 9, 2025 (updated October 29, 2025)

A security flaw has been discovered in lmsys sglang 0.4.6. Affected by this vulnerability is the function main of the file /update_weights_from_tensor. The manipulation of the argument serialized_named_tensors results in deserialization. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

References

  • github.com/advisories/GHSA-9w53-xr52-mwgj
  • github.com/sgl-project/sglang
  • github.com/sgl-project/sglang/commit/49afb3d9d9deedf6dea3a6dd5c50e85e7d8bcb07
  • nvd.nist.gov/vuln/detail/CVE-2025-10164
  • vuldb.com/?ctiid.323203
  • vuldb.com/?id.323203
  • vuldb.com/?submit.635919

Code Behaviors & Features

Detect and mitigate CVE-2025-10164 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.5.4

Fixed versions

  • 0.5.4

Solution

Upgrade to version 0.5.4 or above.

Impact 7.3 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation
  • CWE-502: Deserialization of Untrusted Data

Source file

pypi/sglang/CVE-2025-10164.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 04 Nov 2025 12:19:58 +0000.