The following table lists the changes that have been made to the
CVE-2025-48942 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]May. 30, 2025
Action Type Old Value New Value Added Description vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8.0 up to but excluding 0.9.0, hitting the /v1/completions API with a invalid json_schema as a Guided Param kills the vllm server. This vulnerability is similar GHSA-9hcf-v7m4-6m2j/CVE-2025-48943, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue. Added CVSS V3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE CWE-248 Added Reference https://github.com/vllm-project/vllm/commit/08bf7840780980c7568c573c70a6a8db94fd45ff Added Reference https://github.com/vllm-project/vllm/issues/17248 Added Reference https://github.com/vllm-project/vllm/pull/17623 Added Reference https://github.com/vllm-project/vllm/security/advisories/GHSA-6qc9-v4r8-22xg