LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code execution.
CVSS
No CVSS.
References
Configurations
No configuration.
History
18 Feb 2026, 17:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
17 Feb 2026, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-17 03:16
Updated : 2026-02-18 17:52
NVD link : CVE-2026-26220
Mitre link : CVE-2026-26220
CVE.ORG link : CVE-2026-26220
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data
