High severity7.8NVD Advisory· Published Mar 12, 2026· Updated Apr 7, 2026
CVE-2026-3989
CVE-2026-3989
Description
SGLangs replay_request_dump.py contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
sglangPyPI | < 0.5.10 | 0.5.10 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-hvwj-8w5g-28rgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-3989ghsaADVISORY
- github.com/sgl-project/sglang/blob/main/scripts/playground/replay_request_dump.pynvdWEB
- github.com/sgl-project/sglang/pull/20904nvdWEB
- github.com/sgl-project/sglang/releases/tag/v0.5.10nvdWEB
- orca.security/resources/blog/sglang-llm-framework-rce-vulnerabilitiesghsaWEB
- orca.security/resources/blog/sglang-llm-framework-rce-vulnerabilities/nvd
News mentions
2- ⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & MoreThe Hacker News · Apr 27, 2026
- Building the foundation for running extra-large language modelsCloudflare Blog · Apr 16, 2026