Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2057 | BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the `add_deployment` function, which decodes and decrypts environment variables from base64 and assigns them to `os.environ`. An attacker can exploit this by sending a malicious payload to the `/config/update` endpoint, which is then processed and executed by the server when the `get_secret` function is triggered. This requires the server to use Google KMS and a database to store a model. |
Github GHSA |
GHSA-gppg-gqw8-wh9g | litellm vulnerable to remote code execution based on using eval unsafely |
Fri, 20 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Litellm
Litellm litellm |
|
| CPEs | cpe:2.3:a:litellm:litellm:1.35.8:*:*:*:*:*:*:* | |
| Vendors & Products |
Litellm
Litellm litellm |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-10-15T12:50:28.520Z
Reserved: 2024-06-07T16:33:15.277Z
Link: CVE-2024-5751
Updated: 2024-08-01T21:18:07.126Z
Status : Modified
Published: 2024-06-27T19:15:16.160
Modified: 2024-11-21T09:48:16.813
Link: CVE-2024-5751
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA