HIGHCVE-2026-35029CVSS 7.5

LiteLLM: Privilege escalation via unrestricted proxy configuration endpoint

अनुवाद हो रहा है…

प्लेटफ़ॉर्म

python

घटक

litellm

में ठीक किया गया

1.83.0

AI Confidence: highNVDEPSS 0.2%समीक्षित: मई 2026
आपकी भाषा में अनुवाद हो रहा है…

CVE-2026-35029 describes a Privilege Escalation vulnerability within LiteLLM, a Python library. This flaw allows authenticated users to bypass authorization checks on the /config/update endpoint, granting them unauthorized access to modify critical system settings. Affected versions include those from 0.0.0 up to, but not including, version 1.83.0. A patch has been released in version 1.83.0.

Python

इस CVE को अपने प्रोजेक्ट में पहचानें

अपनी requirements.txt फ़ाइल अपलोड करें और तुरंत जानें कि आप प्रभावित हैं या नहीं।

requirements.txt अपलोड करेंसमर्थित प्रारूप: requirements.txt · Pipfile.lock

प्रभाव और हमले की स्थितियाँअनुवाद हो रहा है…

The /config/update endpoint in LiteLLM lacks proper admin role authorization, creating a significant security risk. An attacker who has already authenticated to the platform can exploit this to modify proxy configurations and environment variables, effectively controlling the application's behavior. More critically, they can register custom pass-through endpoint handlers, allowing them to execute arbitrary Python code on the server – leading to Remote Code Execution (RCE). Furthermore, attackers can read arbitrary server files by manipulating the UILOGOPATH variable and accessing /getimage. Finally, they can potentially take over privileged accounts by overwriting the UIUSERNAME and UI_PASSWORD environment variables, gaining unauthorized access to sensitive data and system resources.

शोषण संदर्भअनुवाद हो रहा है…

CVE-2026-35029 was publicly disclosed on 2026-04-06. As of this writing, there is no indication of active exploitation in the wild. No public proof-of-concept (PoC) code has been released. The vulnerability has not been added to the CISA KEV catalog. The CVSS score of 7.5 (HIGH) indicates a significant potential for exploitation if left unaddressed.

कौन जोखिम में हैअनुवाद हो रहा है…

Organizations deploying LiteLLM in production environments, particularly those with multiple users or roles, are at risk. Shared hosting environments where users have limited control over server configurations are also particularly vulnerable. Legacy deployments using older versions of LiteLLM are at the highest risk.

पहचान के चरणअनुवाद हो रहा है…

• python / server:

import os
import subprocess

def check_env_vars():
    sensitive_vars = ['UI_USERNAME', 'UI_PASSWORD']
    for var in sensitive_vars:
        if var in os.environ:
            print(f"Warning: Sensitive environment variable '{var}' is set.")

check_env_vars()

• python / server: Check for unauthorized modifications to proxy configurations or custom endpoint handlers in LiteLLM's configuration files. • python / server: Monitor system logs for unusual activity related to the /config/update endpoint, such as unexpected requests or modifications to environment variables. • python / server: Review LiteLLM's environment variables for unexpected or unauthorized values using os.environ.

हमले की समयरेखा

  1. Disclosure

    disclosure

खतरा खुफिया

एक्सप्लॉइट स्थिति

प्रूफ ऑफ कॉन्सेप्टअज्ञात
CISA KEVNO
रिपोर्ट1 खतरा रिपोर्ट

EPSS

0.19% (41% शतमक)

CISA SSVC

शोषणnone
स्वचालनीयno
तकनीकी प्रभावtotal

प्रभावित सॉफ्टवेयर

घटकlitellm
विक्रेताBerriAI
प्रभावित श्रेणीमें ठीक किया गया
< 1.83.0 – < 1.83.0
1.83.0

कमजोरी वर्गीकरण (CWE)

समयरेखा

  1. आरक्षित
  2. प्रकाशित
  3. संशोधित
  4. EPSS अद्यतन
प्रकाशन के -6 दिन बाद पैच

शमन और वर्कअराउंडअनुवाद हो रहा है…

The primary mitigation for CVE-2026-35029 is to immediately upgrade LiteLLM to version 1.83.0 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing temporary workarounds. Restrict access to the /config/update endpoint to only authorized administrators. Implement strict input validation and sanitization on all parameters passed to this endpoint. Consider using a Web Application Firewall (WAF) to block suspicious requests targeting this endpoint. Regularly review and audit environment variables to detect any unauthorized modifications.

कैसे ठीक करेंअनुवाद हो रहा है…

Actualice a la versión 1.83.0 o superior para mitigar la vulnerabilidad. Esta versión corrige la falta de autorización de roles de administrador en el endpoint /config/update, previniendo la ejecución remota de código y la manipulación de la configuración del proxy.

CVE सुरक्षा न्यूज़लेटर

भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।

अक्सर पूछे जाने वाले सवालअनुवाद हो रहा है…

What is CVE-2026-35029 — Privilege Escalation in LiteLLM?

CVE-2026-35029 is a HIGH severity vulnerability in LiteLLM versions 0.0.0 through 1.82.0 that allows authenticated users to escalate privileges and potentially gain unauthorized access to system resources.

Am I affected by CVE-2026-35029 in LiteLLM?

If you are using LiteLLM versions 0.0.0 through 1.82.0, you are potentially affected by this vulnerability. Upgrade to version 1.83.0 or later to mitigate the risk.

How do I fix CVE-2026-35029 in LiteLLM?

The recommended fix is to upgrade to LiteLLM version 1.83.0 or later. If upgrading is not immediately possible, implement temporary workarounds such as restricting access to the /config/update endpoint.

Is CVE-2026-35029 being actively exploited?

As of now, there is no evidence of active exploitation in the wild, but the vulnerability's severity warrants immediate attention and remediation.

Where can I find the official LiteLLM advisory for CVE-2026-35029?

Refer to the official LiteLLM project repository and security advisories for the latest information and updates regarding CVE-2026-35029.

क्या आपका प्रोजेक्ट प्रभावित है?

अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।