CVE-2024-5751
- EPSS 5.36%
- Veröffentlicht 27.06.2024 19:15:16
- Zuletzt bearbeitet 21.11.2024 09:48:16
BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the `add_deployment` function, which decodes and decrypts environment variables from base64 and assigns them to ...
CVE-2024-5710
- EPSS 0.08%
- Veröffentlicht 27.06.2024 19:15:15
- Zuletzt bearbeitet 15.10.2025 13:15:47
berriai/litellm version 1.34.34 is vulnerable to improper access control in its team management functionality. This vulnerability allows attackers to perform unauthorized actions such as creating, updating, viewing, deleting, blocking, and unblocking...
CVE-2024-5225
- EPSS 0.24%
- Veröffentlicht 06.06.2024 19:16:06
- Zuletzt bearbeitet 21.11.2024 09:47:13
An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code cons...
CVE-2024-4890
- EPSS 0.07%
- Veröffentlicht 06.06.2024 19:16:03
- Zuletzt bearbeitet 21.11.2024 09:43:48
A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting use...
CVE-2024-4888
- EPSS 0.06%
- Veröffentlicht 06.06.2024 19:16:03
- Zuletzt bearbeitet 21.11.2024 09:43:47
BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includ...
CVE-2024-4889
- EPSS 0.17%
- Veröffentlicht 06.06.2024 18:15:18
- Zuletzt bearbeitet 21.11.2024 09:43:47
A code injection vulnerability exists in the berriai/litellm application, version 1.34.6, due to the use of unvalidated input in the eval function within the secret management system. This vulnerability requires a valid Google KMS configuration file ...
CVE-2024-2952
- EPSS 1.43%
- Veröffentlicht 10.04.2024 17:15:54
- Zuletzt bearbeitet 15.07.2025 14:21:14
BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the `/completions` endpoint. The vulnerability arises from the `hf_chat_template` method processing the `chat_template` parameter from the `tokenizer_config.json` file through...