PatchSiren cyber security CVE debrief
CVE-2026-34760 Vllm CVE debrief
CVE-2026-34760 describes an audio-processing integrity issue in environments using vLLM with Librosa: mono downmixing defaults to numpy.mean, while ITU-R BS.775-4 calls for weighted downmixing. That mismatch can make audio interpreted by AI systems differ from what humans hear, creating inconsistent model inputs. The issue is assigned CVSS 5.9 (Medium) and is patched in vLLM 0.18.0.
- Vendor
- Vllm
- Product
- CVE-2026-34760
- CVSS
- MEDIUM 5.9
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-02
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-04-02
- Advisory updated
- 2026-05-11
Who should care
Teams running vLLM or other audio-to-model pipelines that rely on Librosa for preprocessing, especially where speech, music, moderation, transcription, or classification decisions depend on faithful audio representation.
Technical summary
The vulnerable range in the NVD record is vllm:vllm versions 0.5.5 through before 0.18.0. The problem is not code execution; it is a mismatch in mono downmix behavior. Librosa’s default to_mono behavior uses numpy.mean, while the referenced international standard expects weighted downmixing. In practice, this can produce input audio that is numerically different from the channel balance perceived by listeners, which can affect downstream AI outputs. NVD lists the weakness as CWE-20 (Improper Input Validation) and the CVSS vector is AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L.
Defensive priority
Medium
Recommended defensive actions
- Upgrade to vLLM 0.18.0 or later, which the advisory says contains the fix.
- Review any audio ingestion or preprocessing paths that use Librosa to ensure mono conversion matches your intended policy and standards.
- If exact perceptual fidelity matters, validate preprocessing against the expected downmix method rather than relying on defaults.
- Test model outputs after upgrading to confirm that audio normalization and channel-mixing changes do not alter downstream behavior in unexpected ways.
- Track any downstream systems that consume preprocessed audio from vLLM so they can be revalidated after the change.
Evidence notes
This debrief is based only on the supplied NVD record and linked official references. The NVD entry marks the vulnerability as analyzed, lists affected versions from 0.5.5 to before 0.18.0, and provides CVSS 3.1 vector AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L. Official references include the GitHub patch commit, issue-tracking pull request, v0.18.0 release notes, and the vendor advisory.
Official resources
-
CVE-2026-34760 CVE record
CVE.org
-
CVE-2026-34760 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch
-
Source reference
[email protected] - Issue Tracking
-
Mitigation or vendor reference
[email protected] - Release Notes
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in the NVD record on 2026-04-02 and updated on 2026-05-11; the vendor advisory and release notes indicate the issue is patched in vLLM 0.18.0.