CVE-2026-5760 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: April 20, 2026
SGLang - Remote Code Execution
Overview
SGLang contains a remote code execution caused by unsandboxed rendering of malicious tokenizer.chat_template in Jinja2 chat templates at /v1/rerank endpoint, letting attackers execute arbitrary code remotely, exploit requires loading a malicious model file.
Severity & Score
Impact
Attackers can execute arbitrary code remotely by loading a malicious model file, potentially compromising the entire system.
Mitigation
Update to the latest version with sandboxed Jinja2 environment or apply patches that restrict template rendering.
Social Media Activity(2 posts)
š“ CVE-2026-5760 - Critical (9.8) SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment(). š https://www.thehackerwire.com/vulnerability/CVE-2026-5760/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš“ CVE-2026-5760 - Critical (9.8) SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment(). š https://www.thehackerwire.com/vulnerability/CVE-2026-5760/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postGitHub Repositories(1 repo)
Related Resources
Details
- CVE ID
- CVE-2026-5760
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- template_injection
- Status
- unconfirmed
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-94
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H