ZDI-CAN-28624 HIGH 7.2 Overdue Dec 18, 2025

LiteLLM

LiteLLM, a popular open-source library that provides a unified interface for multiple large language models, has a high-severity vulnerability (CVSS 7.2) that can be exploited remotely by authenticated users with high privileges to achieve complete compromise of confidentiality, integrity, and authenticity. The attack requires network access and high-level permissions but no user interaction, making it a significant risk in environments where LiteLLM is deployed with administrative access. Security teams should monitor for patches after the April 2026 vendor deadline and assess whether their implementations expose LiteLLM to trusted internal users who could potentially abuse elevated privileges.

Advisory Details
Researcher Discovered by: Alfredo Oliveira and David Fiser of Trend Research
Reported December 18, 2025
Deadline April 17, 2026 3d overdue
CVSS Vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy