CVE-2026-7302

SGLangs · Multimodal Generation Runtime

The SGLangs runtime is vulnerable to an unauthenticated path traversal attack, allowing remote attackers to write arbitrary files to the server's filesystem.

Executive summary

Unauthenticated path traversal in the SGLangs runtime allows attackers to overwrite critical files, potentially leading to full system compromise.

Vulnerability

The application fails to validate filenames provided during upload, allowing the use of ../ sequences to traverse outside of intended directories and overwrite arbitrary system files.

Business impact

With a CVSS score of 9.1, this vulnerability allows an attacker to achieve code execution or denial of service by overwriting application binaries or configuration files. This represents a critical risk to the availability and integrity of the hosting server.

Remediation

Immediate Action: Update to the latest version of SGLangs and implement strict path validation for file uploads.

Proactive Monitoring: Monitor filesystem integrity and alert on unauthorized write attempts to sensitive system directories.

Compensating Controls: Run the SGLangs service with the least privilege necessary, restricting its write access to specific, isolated directories.

Exploitation status

Public Exploit Available: No