CVE-2024-4890
MEDIUMLitellm - SQL Injection
Title source: ruleDescription
A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting users. An attacker can exploit this vulnerability by injecting malicious SQL commands through the 'user_id' parameter, leading to potential unauthorized access to sensitive information such as API keys, user information, and tokens stored in the database. The affected version is 1.27.14.
Exploits (1)
nomisec
WORKING POC
by nekr0ff · poc
https://github.com/nekr0ff/needrestart-sudo-escalate-cve-2024-4890
Scores
CVSS v3
4.9
EPSS
0.0006
EPSS Percentile
20.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-89
Status
published
Products (2)
litellm/litellm
1.27.14
pypi/litellm
0PyPI
Published
Jun 06, 2024
Tracked Since
Feb 18, 2026