A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch and...
Full analysis pending. Showing NVD description excerpt.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| vllm | pip | >= 0.5.0, < 0.11.0 | 0.11.0 |
Do you use vllm? You're affected.
Severity & Risk
Recommended Action
Patch available
Update vllm to version 0.11.0
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Technical Details
NVD Description
A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch and process media from user-provided URLs without adequate restrictions on the target hosts. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H References
- access.redhat.com/security/cve/CVE-2025-6242
- bugzilla.redhat.com/show_bug.cgi
- github.com/advisories/GHSA-3f6c-7fw2-ppm4
- github.com/vllm-project/vllm/commit/9d9a2b77f19f68262d5e469c4e82c0f6365ad72d
- github.com/vllm-project/vllm/security/advisories/GHSA-3f6c-7fw2-ppm4
- nvd.nist.gov/vuln/detail/CVE-2025-6242
- access.redhat.com/security/cve/CVE-2025-6242
- bugzilla.redhat.com/show_bug.cgi