CVE-2026-5760: SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious...
CRITICAL
CVSS 9.5
Exploit Available
1 PoC
Published: April 20, 2026 | Last Modified: April 20, 2026
Description
SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment().
Ghostwire Analysis — What This Means Practically
- Critical CVSS score indicates maximum severity — remote code execution, authentication bypass, or complete system compromise is likely possible.
- 1 proof-of-concept exploit available on GitHub. Public exploit code lowers the barrier for both researchers and attackers.
- 3 articles from independent security sources have covered this vulnerability, indicating significant industry attention.
This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.
Proof-of-Concept Exploits (1)
Security Coverage (3 articles)
References