Litellm

Litellm

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 29.10.2025 19:32:10
  • Zuletzt bearbeitet 30.10.2025 15:03:13

LiteLLM Information health API_KEY Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of LiteLLM. Authentication is required to exploit this vulnerability. The...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 03.07.2025 00:00:00
  • Zuletzt bearbeitet 01.08.2025 22:23:20

BerriAI litellm v1.65.4 was discovered to contain a SQL injection vulnerability via the /key/block endpoint.

Exploit
  • EPSS 1.35%
  • Veröffentlicht 20.03.2025 10:11:36
  • Zuletzt bearbeitet 15.10.2025 13:15:49

BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' ...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 20.03.2025 10:09:34
  • Zuletzt bearbeitet 01.08.2025 13:58:47

In berriai/litellm version v1.52.1, an issue in proxy_server.py causes the leakage of Langfuse API keys when an error occurs while parsing team settings. This vulnerability exposes sensitive information, including langfuse_secret and langfuse_public_...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 20.03.2025 10:09:24
  • Zuletzt bearbeitet 07.04.2025 14:50:05

In berriai/litellm before version 1.44.12, the `litellm/litellm_core_utils/litellm_logging.py` file contains a vulnerability where the API key masking code only masks the first 5 characters of the key. This results in the leakage of almost the entire...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 20.03.2025 10:09:19
  • Zuletzt bearbeitet 15.10.2025 13:15:56

A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously process...

Exploit
  • EPSS 88.37%
  • Veröffentlicht 13.09.2024 16:15:04
  • Zuletzt bearbeitet 20.09.2024 14:55:16

A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the re...

  • EPSS 5.36%
  • Veröffentlicht 27.06.2024 19:15:16
  • Zuletzt bearbeitet 21.11.2024 09:48:16

BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the `add_deployment` function, which decodes and decrypts environment variables from base64 and assigns them to ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 27.06.2024 19:15:15
  • Zuletzt bearbeitet 15.10.2025 13:15:47

berriai/litellm version 1.34.34 is vulnerable to improper access control in its team management functionality. This vulnerability allows attackers to perform unauthorized actions such as creating, updating, viewing, deleting, blocking, and unblocking...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 06.06.2024 19:16:06
  • Zuletzt bearbeitet 21.11.2024 09:47:13

An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code cons...