CVE-2026-35029

HIGH NUCLEI

LiteLLM affected by privilege escalation via unrestricted proxy configuration endpoint

Title source: cna

Description

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endpoint to modify proxy configuration and environment variables, register custom pass-through endpoint handlers pointing to attacker-controlled Python code, achieving remote code execution, read arbitrary server files by setting UI_LOGO_PATH and fetching via /get_image, and take over other privileged accounts by overwriting UI_USERNAME and UI_PASSWORD environment variables. Fixed in v1.83.0.

Nuclei Templates (1)

LiteLLM - Arbitrary File Read
HIGHVERIFIEDby theamanrawat

Scores

CVSS v3 8.8
EPSS 0.1003
EPSS Percentile 93.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-863
Status published
Products (3)
BerriAI/litellm < 1.83.0
litellm/litellm < 1.83.0
pypi/litellm 0 - 1.83.0PyPI
Published Apr 06, 2026
Tracked Since Apr 06, 2026