CVE-2026-27893 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 27, 2026
vLLM - Remote Code Execution
Overview
vLLM 0.10.1 to < 0.18.0 contains a remote code execution vulnerability caused by hardcoded trust_remote_code=True in model implementation files, letting remote attackers execute code despite user opt-out, exploit requires loading malicious model repositories.
Severity & Score
Impact
Remote attackers can execute arbitrary code despite user disabling remote code trust, leading to full system compromise.
Mitigation
Update to version 0.18.0 or later.
References
Social Media Activity(1 post)
š CVE-2026-27893 - High (8.8) vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.18.0, two model implementation files hardcode `trust_remote_code=True` when loading sub-components, bypassing the user's ex... š https://www.thehackerwire.com/vulnerability/CVE-2026-27893/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-27893
- Severity
- High
- CVSS Score
- 8.8
- Type
- remote_code_execution
- Status
- new
- EPSS
- 3.0%
- Social Posts
- 1
CWE
- CWE-693
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H