CVE-2026-35030
- EPSS 0.09%
- Veröffentlicht 06.04.2026 16:47:02
- Zuletzt bearbeitet 07.04.2026 20:20:56
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, when JWT authentication is enabled (enable_jwt_auth: true), the OIDC userinfo cache uses token[:20] as the cache key. JWT headers produced by the s...
CVE-2026-35029
- EPSS 0.19%
- Veröffentlicht 06.04.2026 16:35:28
- Zuletzt bearbeitet 07.04.2026 20:21:42
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endp...
CVE-2026-33634
- EPSS 21.15%
- Veröffentlicht 23.03.2026 21:47:29
- Zuletzt bearbeitet 30.03.2026 18:50:38
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all ...
CVE-2025-11203
- EPSS 0.13%
- Veröffentlicht 29.10.2025 19:32:10
- Zuletzt bearbeitet 15.04.2026 00:35:42
LiteLLM Information health API_KEY Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of LiteLLM. Authentication is required to exploit this vulnerability. The...
CVE-2025-45809
- EPSS 0.07%
- Veröffentlicht 03.07.2025 00:00:00
- Zuletzt bearbeitet 12.03.2026 17:16:22
SQL Injection vulnerability in BerriAI LiteLLM before 1.81.0 allows attackers to execute arbitrary commands via the key parameter to the "/key/block" and "/key/unblock" API endpoints.
CVE-2024-6825
- EPSS 1.35%
- Veröffentlicht 20.03.2025 10:11:36
- Zuletzt bearbeitet 15.10.2025 13:15:49
BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' ...
CVE-2025-0330
- EPSS 0.18%
- Veröffentlicht 20.03.2025 10:09:34
- Zuletzt bearbeitet 01.08.2025 13:58:47
In berriai/litellm version v1.52.1, an issue in proxy_server.py causes the leakage of Langfuse API keys when an error occurs while parsing team settings. This vulnerability exposes sensitive information, including langfuse_secret and langfuse_public_...
CVE-2024-9606
- EPSS 0.11%
- Veröffentlicht 20.03.2025 10:09:24
- Zuletzt bearbeitet 07.04.2025 14:50:05
In berriai/litellm before version 1.44.12, the `litellm/litellm_core_utils/litellm_logging.py` file contains a vulnerability where the API key masking code only masks the first 5 characters of the key. This results in the leakage of almost the entire...
CVE-2024-8984
- EPSS 0.2%
- Veröffentlicht 20.03.2025 10:09:19
- Zuletzt bearbeitet 15.10.2025 13:15:56
A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously process...
CVE-2024-6587
- EPSS 88.37%
- Veröffentlicht 13.09.2024 16:15:04
- Zuletzt bearbeitet 20.09.2024 14:55:16
A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the re...