CVE-2026-26220 PUBLISHED

LightLLM <= 1.1.0 PD Mode Unsafe Deserialization RCE

Assigner: VulnCheck
Reserved: 11.02.2026 Published: 17.02.2026 Updated: 17.02.2026

LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code execution.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor ModelTC
Product LightLLM
Versions Default: unknown
  • affected from 0 to 1.1.0 (incl.)

Credits

  • Valentin Lobstein (Chocapikk) finder

References

Problem Types

  • CWE-502 Deserialization of Untrusted Data CWE