CVE-2026-35029
LiteLLM affected by privilege escalation via unrestricted proxy configuration endpoint
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endpoint to modify proxy configuration and environment variables, register custom pass-through endpoint handlers pointing to attacker-controlled Python code, achieving remote code execution, read arbitrary server files by setting UI_LOGO_PATH and fetching via /get_image, and take over other privileged accounts by overwriting UI_USERNAME and UI_PASSWORD environment variables. Fixed in v1.83.0.
| CWE | CWE-863 |
| Vendor | berriai |
| Product | litellm |
| Published | Apr 6, 2026 |
| Last Updated | Apr 6, 2026 |
Get instant alerts for berriai litellm
Be the first to know when new unknown vulnerabilities affecting berriai litellm are published โ delivered to Slack, Telegram or Discord.