In a multi-node deployment, vLLM's primary host binds an XPUB ZeroMQ socket to all network interfaces, enabling any network-accessible client to connect and receive sensitive internal data. This vulnerability results in unintended data exposure, allowing unauthorized parties to view details of requests processed by the system. If the vLLM host is deployed in an untrusted network without strict firewall rules, an attacker can passively listen to the ZeroMQ stream and extract private inference request data.