Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-79j6-g2m3-jgfw: vLLM has remote code execution vulnerability in the tool call parser for Qwen3-Coder

Summary

An unsafe deserialization vulnerability allows any authenticated user to execute arbitrary code on the server if they are able to get the model to pass the code as an argument to a tool call.

Details

vLLM’s Qwen3 Coder tool parser contains a code execution path that uses Python’s eval() function to parse tool call parameters. This occurs during the parameter conversion process when the parser attempts to handle unknown data types.

This code path is reached when:

  1. Tool calling is enabled (--enable-auto-tool-choice)
  2. The qwen3_coder parser is specified (--tool-call-parser qwen3_coder)
  3. The parameter type is not explicitly defined or recognized

Impact

Remote Code Execution via Python’s eval() function.

ghsa
#vulnerability#web#git#intel#rce#auth

Skip to content

Navigation Menu

    • GitHub Copilot

      Write better code with AI

    • GitHub Spark New

      Build and deploy intelligent apps

    • GitHub Models New

      Manage and compare prompts

    • GitHub Advanced Security

      Find and fix vulnerabilities

    • Actions

      Automate any workflow

*   Codespaces
    
    Instant dev environments
    
*   Issues
    
    Plan and track work
    
*   Code Review
    
    Manage code changes
    
*   Discussions
    
    Collaborate outside of code
    
*   Code Search
    
    Find more, search less
  • Explore

    • Learning Pathways
    • Events & Webinars
    • Ebooks & Whitepapers
    • Customer Stories
    • Partners
    • Executive Insights
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    • Enterprise platform

      AI-powered developer platform

  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

Appearance settings

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-9141

vLLM has remote code execution vulnerability in the tool call parser for Qwen3-Coder

High severity GitHub Reviewed Published Aug 20, 2025 in vllm-project/vllm • Updated Aug 21, 2025

Affected versions

>= 0.10.0, < 0.10.1.1

Patched versions

0.10.1.1

Description

Summary

An unsafe deserialization vulnerability allows any authenticated user to execute arbitrary code on the server if they are able to get the model to pass the code as an argument to a tool call.

Details

vLLM’s Qwen3 Coder tool parser contains a code execution path that uses Python’s eval() function to parse tool call parameters. This occurs during the parameter conversion process when the parser attempts to handle unknown data types.

This code path is reached when:

  1. Tool calling is enabled (–enable-auto-tool-choice)
  2. The qwen3_coder parser is specified (–tool-call-parser qwen3_coder)
  3. The parameter type is not explicitly defined or recognized

Impact

Remote Code Execution via Python’s eval() function.

References

  • GHSA-79j6-g2m3-jgfw
  • vllm-project/vllm#21396
  • vllm-project/vllm@4594fc3

Published to the GitHub Advisory Database

Aug 21, 2025

Last updated

Aug 21, 2025

EPSS score

ghsa: Latest News

GHSA-8hmm-4crw-vm2c: @musistudio/claude-code-router has improper CORS configuration