๐Ÿ” CVE Alert

CVE-2026-42271

UNKNOWN 0.0

LiteLLM: Authenticated command execution via MCP stdio test endpoints

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
14th

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.74.2 to before version 1.83.7, two endpoints used to preview an MCP server before saving it โ€” POST /mcp-rest/test/connection and POST /mcp-rest/test/tools/list โ€” accepted a full server configuration in the request body, including the command, args, and env fields used by the stdio transport. When called with a stdio configuration, the endpoints attempted to connect, which spawned the supplied command as a subprocess on the proxy host with the privileges of the proxy process. The endpoints were gated only by a valid proxy API key, with no role check. Any authenticated user โ€” including holders of low-privilege internal-user keys โ€” could therefore run arbitrary commands on the host. This issue has been patched in version 1.83.7.

CWE CWE-77 CWE-78
Vendor berriai
Product litellm
Published May 8, 2026
Last Updated May 8, 2026
Stay Ahead of the Next One

Get instant alerts for berriai litellm

Be the first to know when new unknown vulnerabilities affecting berriai litellm are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

BerriAI / litellm
>= 1.74.2, < 1.83.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/BerriAI/litellm/security/advisories/GHSA-v4p8-mg3p-g94g github.com: https://github.com/BerriAI/litellm/releases/tag/v1.83.7-stable