Arbitrary Command Execution Vulnerability in LiteLLM Proxy Server by BerriAI
CVE-2026-42271

8.7HIGH

Key Information:

Vendor

Berriai

Status
Vendor
CVE Published:
8 May 2026

What is CVE-2026-42271?

The LiteLLM proxy server by BerriAI, used to interface with LLM APIs, has a significant vulnerability that allows authenticated users to execute arbitrary commands on the host system. This issue arises from two endpoints that accept a complete server configuration in the request body, which includes sensitive command, arguments, and environment fields. When triggered with specific configurations, these endpoints can dangerously spawn commands as subprocesses with the privileges assigned to the proxy process. This vulnerability affects all versions from 1.74.2 up to but not including 1.83.7 and has been corrected in the latter version. Users are urged to update to ensure security.

Affected Version(s)

litellm >= 1.74.2, < 1.83.7

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.