Privilege Escalation Vulnerability in LiteLLM by BerriAI
CVE-2026-47102
Key Information:
Badges
What is CVE-2026-47102?
LiteLLM versions before 1.83.10 have a vulnerability that allows users to change their own user_role through the /user/update endpoint. Although this endpoint restricts access to updating only the user's account, it fails to limit which fields can be modified. This oversight enables a user with access to the endpoint to alter their role to proxy_admin, granting them unauthorized administrative privileges over the entire LiteLLM environment, including sensitive information like user data, team configurations, and access to models and prompt history. The flaw can be exploited by users with legitimate roles, such as org_admin, without needing to chain it with other vulnerabilities.
Affected Version(s)
litellm 0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
