CVE-2026-26220

N/A Unknown

📋 TL;DR

LightLLM versions 1.1.0 and earlier contain an unauthenticated remote code execution vulnerability in PD disaggregation mode. Attackers can send malicious pickle payloads via WebSocket to the PD master node to execute arbitrary code. Organizations running LightLLM with PD mode enabled are affected.

💻 Affected Systems

Products:
  • LightLLM
Versions: 1.1.0 and prior
Operating Systems: All platforms running LightLLM
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when PD (prefill-decode) disaggregation mode is enabled and PD master node is accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands, steal data, install malware, or pivot to other systems.

🟠

Likely Case

Unauthorized code execution leading to data exfiltration, service disruption, or cryptocurrency mining.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent access to vulnerable endpoints.

🌐 Internet-Facing: HIGH - Unauthenticated RCE accessible via WebSocket endpoints exposed to internet.
🏢 Internal Only: HIGH - Even internally, unauthenticated RCE poses significant risk if accessible to any internal user.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires sending crafted pickle payload via WebSocket to vulnerable endpoints. Public technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Monitor LightLLM GitHub repository for security updates. 2. Apply patch when available. 3. Restart LightLLM services after patching.

🔧 Temporary Workarounds

Disable PD Mode

all

Disable prefill-decode disaggregation mode if not required.

Modify LightLLM configuration to disable PD mode

Network Access Control

all

Restrict network access to PD master node WebSocket endpoints.

Configure firewall rules to block external access to PD master ports
Use network segmentation to isolate PD master

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PD master from untrusted networks
  • Add authentication layer before pickle.loads() calls in the WebSocket handlers

🔍 How to Verify

Check if Vulnerable:

Check if LightLLM version is 1.1.0 or earlier and PD mode is enabled with PD master accessible.

Check Version:

Check LightLLM version in configuration or via package manager (e.g., pip show lightllm)

Verify Fix Applied:

Verify LightLLM version is updated beyond 1.1.0 and PD master endpoints no longer accept unauthenticated pickle payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual WebSocket connections to PD master
  • Pickle deserialization errors
  • Unexpected process execution

Network Indicators:

  • WebSocket traffic to PD master port with binary frames
  • Outbound connections from PD master to unexpected destinations

SIEM Query:

websocket AND (pickle OR deserialization) AND pd_master

🔗 References

📤 Share & Export