<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>VLLM — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/vllm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 00:16:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/vllm/feed.xml" rel="self" type="application/rss+xml"/><item><title>vLLM Remote Code Execution Vulnerability (CVE-2026-27893)</title><link>https://feed.craftedsignal.io/briefs/2026-03-vllm-rce/</link><pubDate>Fri, 27 Mar 2026 00:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-vllm-rce/</guid><description>vLLM versions before 0.18.0 are vulnerable to remote code execution due to hardcoded trust of remote code, even when explicitly disabled by the user, allowing attackers to execute arbitrary code via malicious model repositories.</description><content:encoded><![CDATA[<p>vLLM is an inference and serving engine for large language models (LLMs). Prior to version 0.18.0, specifically from version 0.10.1, a critical vulnerability exists. Two model implementation files within vLLM hardcode the setting <code>trust_remote_code=True</code> when loading sub-components of models. This design flaw bypasses the user&rsquo;s explicit security intention to disable remote code execution using the <code>--trust-remote-code=False</code> option. An attacker could craft a malicious model repository that…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vLLM</category><category>RCE</category><category>CVE-2026-27893</category></item></channel></rss>