Skip to content

CVE-2026-5760 — SGLang GGUF template RCE

A critical remote code execution vulnerability in SGLang allows attacker- controlled model metadata/template content to execute code when processed by the vulnerable reranking path. CERT/CC published VU#915947 on 2026-04-20, tracking this issue as CVE-2026-5760.

Affected versions

  • Vulnerable: SGLang releases before the vendor’s fixed release for CVE-2026-5760
  • Fixed: upgrade to the first SGLang release that explicitly includes the CVE-2026-5760 remediation (verify via release notes/advisory)

Indicator-of-exposure

  • SGLang service is enabled with reranking/model-loading paths.
  • Untrusted or externally sourced GGUF/model artifacts can reach runtime.
  • Service is network-reachable from untrusted users.

Quick checks:

python -m pip show sglang
rg -n "rerank|chat_template|GGUF|tokenizer.chat_template" .
ss -lntp | rg ':(30000|8080|80|443)'

Remediation strategy

  • Upgrade SGLang to the fixed release.
  • Treat model artifacts as untrusted input; allow-list approved model sources.
  • Disable or isolate vulnerable endpoints until patch deployment completes.
  • Rebuild and redeploy affected inference images after patching.

The prompt

You are remediating CVE-2026-5760 (SGLang GGUF/template RCE). Produce exactly
one output:

- A PR/change request with the patch + compensating controls, or
- TRIAGE.md if a safe patch path is unavailable.

## Rules

- Scope only this CVE.
- Assume model files and template metadata are untrusted.
- Prefer minimal safe version bump to the vendor-fixed SGLang release.
- Do not auto-merge.

## Steps

1. Detect current SGLang version in manifests/lockfiles/container tags.
2. Confirm whether vulnerable model-template processing paths are enabled.
3. Upgrade SGLang to fixed version and regenerate lockfiles/images.
4. Add guardrails in deployment config/docs:
   - only pull models from approved registries/buckets,
   - disable risky endpoints or restrict them behind auth/network policy,
   - capture provenance (digest/signature) for model files.
5. Run tests and service smoke checks.
6. PR title:
   `fix(sec): remediate CVE-2026-5760 in sglang runtime`.

## Stop conditions

- Fixed version not yet available for target platform.
- SGLang not present in this repo/deployment.
- Build/test failures are unrelated and pre-existing.

Verification — what the reviewer looks for

  • Dependency/container version now points to a fixed SGLang release.
  • Deployment docs/config include model-source trust controls.
  • No vulnerable SGLang version remains in lockfile/image bill of materials.

References