Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files
    Cybersecurity

    SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

    adminBy adminApril 20, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 20, 2026Open Source / Server Security

    A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could result in remote code execution on susceptible systems.

    The vulnerability, tracked as CVE-2026-5760, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of command injection leading to the execution of arbitrary code.

    SGLang is a high-performance, open-source serving framework for large language models and multimodal models. The official GitHub project has been forked over 5,500 times and starred 26,100 times. 

    According to the CERT Coordination Center (CERT/CC), the vulnerability impacts the reranking endpoint “/v1/rerank,” allowing an attacker to achieve arbitrary code execution in the context of the SGLang service by means of a specially crafted GPT-Generated Unified Format (GGUF) model file.

    “An attacker exploits this vulnerability by creating a malicious GPT Generated Unified Format (GGUF) model file with a crafted tokenizer.chat_template parameter that contains a Jinja2 server-side template injection (SSTI) payload with a trigger phrase to activate the vulnerable code path,” CERT/CC said in an advisory released today.

    “The victim then downloads and loads the model in SGLang, and when a request hits the “/v1/rerank” endpoint, the malicious template is rendered, executing the attacker’s arbitrary Python code on the server. This sequence of events enables the attacker to achieve remote code execution (RCE) on the SGLang server.”

    Per security researcher Stuart Beck, who discovered and reported the flaw, the underlying issue stems from the use of jinja2.Environment() without sandboxing instead of ImmutableSandboxedEnvironment. This, in turn, enables a malicious model to execute arbitrary Python code on the inference server.

    The entire sequence of actions is as follows –

    • An attacker creates a GGUF model file with a malicious tokenizer.chat_template containing a Jinja2 SSTI payload
    • The template includes the Qwen3 reranker trigger phrase to activate the vulnerable code path in “entrypoints/openai/serving_rerank.py”
    • Victim downloads and loads the model in SGLang from sources like Hugging Face
    • When a request hits the “/v1/rerank” endpoint, SGLang reads the chat_template and renders it with jinja2.Environment()
    • The SSTI payload executes arbitrary Python code on the server

    It’s worth noting that CVE-2026-5760 falls under the same vulnerability class as CVE-2024-34359 (aka Llama Drama, CVSS score: 9.7), a now-patched critical flaw in the llama_cpp_python Python package that could have resulted in arbitrary code execution. The same attack surface was also rectified in vLLM late last year (CVE-2025-61620, CVSS score: 6.5).

    “To mitigate this vulnerability, it is recommended to use ImmutableSandboxedEnvironment instead of jinja2.Environment() to render the chat templates,” CERT/CC said. “This will prevent the execution of arbitrary Python code on the server. No response or patch was obtained during the coordination process.”

    CVE20265760 CVSS enables Files GGUF Malicious model RCE SGLang
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleYouTube & Discover political ad rules updated
    Next Article This Bright and Powerful Blink Floodlight Camera Is Over Half Off Right Now
    admin
    • Website

    Related Posts

    KelpDAO suffers $290 million heist tied to Lazarus hackers

    April 21, 2026

    Hackers Abuse QEMU for Defense Evasion

    April 21, 2026

    Vercel Employee’s AI Tool Access Led to Data Breach

    April 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    KelpDAO suffers $290 million heist tied to Lazarus hackers

    April 21, 2026

    WhatsApp’s paid subscription starts rolling out to some

    April 21, 2026

    Hackers Abuse QEMU for Defense Evasion

    April 21, 2026

    Winning Google Ads Campaign Structures For DTC Ecommerce

    April 21, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,418)
    • Privacy & Online Earning (174)
    • SEO & Digital Marketing (860)
    • Tech Tools & Mobile / Apps (1,706)
    • WiFi / Internet & Networking (234)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    KelpDAO suffers $290 million heist tied to Lazarus hackers

    April 21, 2026

    WhatsApp’s paid subscription starts rolling out to some

    April 21, 2026

    Hackers Abuse QEMU for Defense Evasion

    April 21, 2026
    Most Popular
    • KelpDAO suffers $290 million heist tied to Lazarus hackers
    • WhatsApp’s paid subscription starts rolling out to some
    • Hackers Abuse QEMU for Defense Evasion
    • Winning Google Ads Campaign Structures For DTC Ecommerce
    • You’ll have one last chance to save on these top-tier Google TV projectors before launch
    • Vercel Employee’s AI Tool Access Led to Data Breach
    • The Internet Still Works: Reddit Empowers Community Moderation
    • This Bright and Powerful Blink Floodlight Camera Is Over Half Off Right Now
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.