Litellm

Litellm

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 06.04.2026 16:47:02
  • Zuletzt bearbeitet 07.04.2026 20:20:56

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, when JWT authentication is enabled (enable_jwt_auth: true), the OIDC userinfo cache uses token[:20] as the cache key. JWT headers produced by the s...

  • EPSS 0.19%
  • Veröffentlicht 06.04.2026 16:35:28
  • Zuletzt bearbeitet 07.04.2026 20:21:42

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endp...

Warnung Medienbericht Exploit
  • EPSS 21.15%
  • Veröffentlicht 23.03.2026 21:47:29
  • Zuletzt bearbeitet 30.03.2026 18:50:38

Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all ...

  • EPSS 0.13%
  • Veröffentlicht 29.10.2025 19:32:10
  • Zuletzt bearbeitet 15.04.2026 00:35:42

LiteLLM Information health API_KEY Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of LiteLLM. Authentication is required to exploit this vulnerability. The...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 03.07.2025 00:00:00
  • Zuletzt bearbeitet 12.03.2026 17:16:22

SQL Injection vulnerability in BerriAI LiteLLM before 1.81.0 allows attackers to execute arbitrary commands via the key parameter to the "/key/block" and "/key/unblock" API endpoints.

Exploit
  • EPSS 1.35%
  • Veröffentlicht 20.03.2025 10:11:36
  • Zuletzt bearbeitet 15.10.2025 13:15:49

BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' ...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 20.03.2025 10:09:34
  • Zuletzt bearbeitet 01.08.2025 13:58:47

In berriai/litellm version v1.52.1, an issue in proxy_server.py causes the leakage of Langfuse API keys when an error occurs while parsing team settings. This vulnerability exposes sensitive information, including langfuse_secret and langfuse_public_...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 20.03.2025 10:09:24
  • Zuletzt bearbeitet 07.04.2025 14:50:05

In berriai/litellm before version 1.44.12, the `litellm/litellm_core_utils/litellm_logging.py` file contains a vulnerability where the API key masking code only masks the first 5 characters of the key. This results in the leakage of almost the entire...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 20.03.2025 10:09:19
  • Zuletzt bearbeitet 15.10.2025 13:15:56

A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously process...

Exploit
  • EPSS 88.37%
  • Veröffentlicht 13.09.2024 16:15:04
  • Zuletzt bearbeitet 20.09.2024 14:55:16

A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the re...