Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-44223
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-12 May, 2026 | 19:58
Updated At-15 May, 2026 | 14:46
Rejected At-
▼CVE Numbering Authority (CNA)
vLLM: extract_hidden_states speculative decoding crashes server on any request with penalty parameters

vLLM is an inference and serving engine for large language models (LLMs). From to before 0.20.0, the extract_hidden_states speculative decoding proposer in vLLM returns a tensor with an incorrect shape after the first decode step, causing a RuntimeError that crashes the EngineCore process. The crash is triggered when any request in the batch uses sampling penalty parameters (repetition_penalty, frequency_penalty, or presence_penalty). A single request with a penalty parameter (e.g., "repetition_penalty": 1.1) is sufficient to crash the server. This vulnerability is fixed in 0.20.0.

Affected Products
Vendor
vllm-project
Product
vllm
Versions
Affected
  • >= 0.18.0, < 0.20.0
Problem Types
TypeCWE IDDescription
CWECWE-131CWE-131: Incorrect Calculation of Buffer Size
CWECWE-704CWE-704: Incorrect Type Conversion or Cast
Type: CWE
CWE ID: CWE-131
Description: CWE-131: Incorrect Calculation of Buffer Size
Type: CWE
CWE ID: CWE-704
Description: CWE-704: Incorrect Type Conversion or Cast
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/vllm-project/vllm/security/advisories/GHSA-83vm-p52w-f9pw
x_refsource_CONFIRM
https://github.com/vllm-project/vllm/pull/38610
x_refsource_MISC
Hyperlink: https://github.com/vllm-project/vllm/security/advisories/GHSA-83vm-p52w-f9pw
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/vllm-project/vllm/pull/38610
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/vllm-project/vllm/security/advisories/GHSA-83vm-p52w-f9pw
exploit
https://github.com/vllm-project/vllm/pull/38610
exploit
Hyperlink: https://github.com/vllm-project/vllm/security/advisories/GHSA-83vm-p52w-f9pw
Resource:
exploit
Hyperlink: https://github.com/vllm-project/vllm/pull/38610
Resource:
exploit
Details not found