Litellm

6 CVEs product

Monthly

CVE-2026-40217 HIGH This Week

Remote code execution in BerriAI LiteLLM (all versions through 2026-04-08) enables authenticated attackers to execute arbitrary code by exploiting bytecode rewriting functionality at the /guardrails/test_custom_code endpoint. The vulnerability requires low-privilege authentication (PR:L) but permits complete system compromise with high impact to confidentiality, integrity, and availability. No public exploit identified at time of analysis.

RCE Litellm
NVD
CVSS 3.1
8.8
EPSS
0.2%
CVE-2025-45809 MEDIUM POC This Month

SQL Injection vulnerability in BerriAI LiteLLM before 1.81.0 allows attackers to execute arbitrary commands via the key parameter to the "/key/block" and "/key/unblock" API endpoints. [CVSS 5.4 MEDIUM]

SQLi Litellm
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-0330 HIGH POC This Week

In berriai/litellm version v1.52.1, an issue in proxy_server.py causes the leakage of Langfuse API keys when an error occurs while parsing team settings. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Litellm
NVD
CVSS 3.0
7.5
EPSS
0.1%
CVE-2024-9606 HIGH POC PATCH This Week

In berriai/litellm before version 1.44.12, the `litellm/litellm_core_utils/litellm_logging.py` file contains a vulnerability where the API key masking code only masks the first 5 characters of the. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Litellm
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2024-8984 HIGH POC PATCH This Month

A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Denial Of Service Litellm
NVD GitHub
CVSS 3.0
7.5
EPSS
0.2%
CVE-2024-6825 HIGH POC MAL This Week

BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

RCE Code Injection Litellm
NVD GitHub
CVSS 3.0
8.8
EPSS
1.3%
CVE-2026-40217
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in BerriAI LiteLLM (all versions through 2026-04-08) enables authenticated attackers to execute arbitrary code by exploiting bytecode rewriting functionality at the /guardrails/test_custom_code endpoint. The vulnerability requires low-privilege authentication (PR:L) but permits complete system compromise with high impact to confidentiality, integrity, and availability. No public exploit identified at time of analysis.

RCE Litellm
NVD
CVE-2025-45809
EPSS 0% CVSS 5.4
MEDIUM POC This Month

SQL Injection vulnerability in BerriAI LiteLLM before 1.81.0 allows attackers to execute arbitrary commands via the key parameter to the "/key/block" and "/key/unblock" API endpoints. [CVSS 5.4 MEDIUM]

SQLi Litellm
NVD GitHub
CVE-2025-0330
EPSS 0% CVSS 7.5
HIGH POC This Week

In berriai/litellm version v1.52.1, an issue in proxy_server.py causes the leakage of Langfuse API keys when an error occurs while parsing team settings. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Litellm
NVD
CVE-2024-9606
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

In berriai/litellm before version 1.44.12, the `litellm/litellm_core_utils/litellm_logging.py` file contains a vulnerability where the API key masking code only masks the first 5 characters of the. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Litellm
NVD GitHub
CVE-2024-8984
EPSS 0% CVSS 7.5
HIGH POC PATCH This Month

A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Denial Of Service Litellm
NVD GitHub
CVE-2024-6825
EPSS 1% CVSS 8.8
HIGH POC This Week

BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

RCE Code Injection Litellm
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy