CVE-2026-35029
HIGH NUCLEILiteLLM affected by privilege escalation via unrestricted proxy configuration endpoint
Title source: cnaDescription
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endpoint to modify proxy configuration and environment variables, register custom pass-through endpoint handlers pointing to attacker-controlled Python code, achieving remote code execution, read arbitrary server files by setting UI_LOGO_PATH and fetching via /get_image, and take over other privileged accounts by overwriting UI_USERNAME and UI_PASSWORD environment variables. Fixed in v1.83.0.
Nuclei Templates (1)
LiteLLM - Arbitrary File Read
HIGHVERIFIEDby theamanrawat
Scores
CVSS v3
8.8
EPSS
0.1003
EPSS Percentile
93.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-863
Status
published
Products (3)
BerriAI/litellm
< 1.83.0
litellm/litellm
< 1.83.0
pypi/litellm
0 - 1.83.0PyPI
Published
Apr 06, 2026
Tracked Since
Apr 06, 2026