CVE-2025-48944.yaml
1 info: 2 name: vllm 3 cve: CVE-2025-48944 4 summary: vLLM Tool Schema allows DoS via Malformed pattern and type Fields 5 details: | 6 The vLLM backend used with the `/v1/chat/completions` OpenAPI endpoint fails to validate unexpected or malformed input in the `"pattern"` and `"type"` fields when the tools functionality is invoked. These inputs are not validated before being compiled or parsed, causing a crash of the inference worker with a single request. The worker will remain down until it is restarted. 7 The `"type"` field is expected to be one of: `"string"`, `"number"`, `"object"`, `"boolean"`, `"array"`, or `"null"`. Supplying any other value will cause the worker to crash. 8 The `"pattern"` field undergoes Jinja2 rendering prior to being passed unsafely into the native regex compiler without validation or escaping. This allows malformed expressions to reach the underlying C++ regex engine, resulting in fatal errors. 9 cvss: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H 10 severity: HIGH 11 security_advise: | 12 1. Upgrade to vllm >= 0.9.0 13 2. Validate and sanitize input for the `"pattern"` and `"type"` fields before processing 14 3. Monitor for any worker crashes and implement automated restarts if necessary 15 rule: version >= "0.8.0" && version < "0.9.0" 16 references: 17 - https://github.com/vllm-project/vllm/security/advisories/GHSA-vrq3-r879-7m65 18 - https://nvd.nist.gov/vuln/detail/CVE-2025-48944 19 - https://github.com/vllm-project/vllm/pull/17623 20 - https://github.com/vllm-project/vllm