9.8
CRITICAL CVSS 3.1
CVE-2026-5760
CVE-2026-5760
Description

SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment().

INFO

Published Date :

April 20, 2026, 2:16 p.m.

Last Modified :

April 29, 2026, 2:16 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2026-5760 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Lmsys sglang
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL 134c704f-9b21-4f2e-91b3-4a467353bcc0
Solution
Update SGLang to a version that properly sandboxes Jinja2 templates.
  • Update SGLang to the latest version.
  • Ensure model files are from trusted sources.
  • Review Jinja2 template rendering security.
Public PoC/Exploit Available at Github

CVE-2026-5760 has a 7 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2026-5760.

URL Resource
https://github.com/Stuub/SGLang-0.5.9-RCE
https://github.com/sgl-project/sglang/pull/23660
https://www.kb.cert.org/vuls/id/915947
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-5760 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-5760 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

HTML TypeScript Python PowerShell Shell JavaScript

Updated: 4 days, 9 hours ago
0 stars 0 fork 0 watcher
Born at : April 28, 2026, 8:50 a.m. This repo has been linked 1 different CVEs too.

None

Updated: 2 weeks, 2 days ago
0 stars 0 fork 0 watcher
Born at : April 22, 2026, 8:40 p.m. This repo has been linked 6 different CVEs too.

None

Python Dockerfile

Updated: 2 weeks, 5 days ago
0 stars 0 fork 0 watcher
Born at : April 13, 2026, 4:47 p.m. This repo has been linked 1 different CVEs too.

Proof of Concept exploitation of CVE-2026-5760 - RCE in SGLang 0.5.9 via malicious GGUF

cve sglang cve-2026-5760

Python

Updated: 2 weeks, 5 days ago
4 stars 2 fork 2 watcher
Born at : April 2, 2026, 2:24 p.m. This repo has been linked 2 different CVEs too.

Threat Hunting based on KQL

Updated: 2 weeks, 3 days ago
5 stars 0 fork 0 watcher
Born at : Feb. 18, 2026, 8:20 a.m. This repo has been linked 9 different CVEs too.

None

Updated: 2 weeks, 2 days ago
2 stars 0 fork 0 watcher
Born at : Dec. 3, 2025, 6:16 p.m. This repo has been linked 5 different CVEs too.

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

security cve exploit poc vulnerability

Updated: 2 weeks, 2 days ago
7667 stars 1247 fork 1247 watcher
Born at : Dec. 8, 2019, 1:03 p.m. This repo has been linked 749 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-5760 vulnerability anywhere in the article.

  • Daily CyberSecurity
Critical 9.8 RCE Threat to SGLang AI Infrastructure

A critical remote code execution (RCE) vulnerability has been uncovered in SGLang, a popular open-source framework used to serve advanced models like DeepSeek and Mistral. The flaw, officially tracked ... Read more

Published Date: Apr 21, 2026 (2 weeks, 6 days ago)
  • CybersecurityNews
Hackers Could Weaponize GGUF Models to Achieve RCE on SGLang Inference Servers

A critical vulnerability in the SGLang inference server that allows threat actors to execute arbitrary code. Tracked as CVE-2026-5760, this flaw allows hackers to weaponize standard GGUF machine learn ... Read more

Published Date: Apr 21, 2026 (2 weeks, 6 days ago)

The following table lists the changes that have been made to the CVE-2026-5760 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    Apr. 29, 2026

    Action Type Old Value New Value
    Added Reference https://github.com/sgl-project/sglang/pull/23660
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Apr. 20, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-94
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 20, 2026

    Action Type Old Value New Value
    Added Reference https://www.kb.cert.org/vuls/id/915947
  • New CVE Received by [email protected]

    Apr. 20, 2026

    Action Type Old Value New Value
    Added Description SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment().
    Added Reference https://github.com/Stuub/SGLang-0.5.9-RCE
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.