XGrammar is an open-source library for efficient, flexible, and portable structured generation. Prior to 0.1.18, Xgrammar includes a cache for compiled grammars to increase performance with repeated use of the same grammar. This cache is held in memory. Since the cache is unbounded, a system making use of xgrammar can be abused to fill up a host's memory and case a denial of service. For example, sending many small requests to an LLM inference server with unique JSON schemas would eventually cause this denial of service to occur. This vulnerability is fixed in 0.1.18.
Metrics
Affected Vendors & Products
References
History
Wed, 17 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mlc-ai
Mlc-ai xgrammar |
|
CPEs | cpe:2.3:a:mlc-ai:xgrammar:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mlc-ai
Mlc-ai xgrammar |
Thu, 10 Apr 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 09 Apr 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 09 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | XGrammar is an open-source library for efficient, flexible, and portable structured generation. Prior to 0.1.18, Xgrammar includes a cache for compiled grammars to increase performance with repeated use of the same grammar. This cache is held in memory. Since the cache is unbounded, a system making use of xgrammar can be abused to fill up a host's memory and case a denial of service. For example, sending many small requests to an LLM inference server with unique JSON schemas would eventually cause this denial of service to occur. This vulnerability is fixed in 0.1.18. | |
Title | Denial of Service by abusing xgrammar unbounded cache in memory | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-04-09T16:00:10.642Z
Updated: 2025-04-09T20:43:33.169Z
Reserved: 2025-04-06T19:46:02.462Z
Link: CVE-2025-32381

Updated: 2025-04-09T17:27:09.287Z

Status : Analyzed
Published: 2025-04-09T16:15:26.210
Modified: 2025-09-17T18:14:55.287
Link: CVE-2025-32381
