Description
A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting users. An attacker can exploit this vulnerability by injecting malicious SQL commands through the 'user_id' parameter, leading to potential unauthorized access to sensitive information such as API keys, user information, and tokens stored in the database. The affected version is 1.27.14.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1982 | A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting users. An attacker can exploit this vulnerability by injecting malicious SQL commands through the 'user_id' parameter, leading to potential unauthorized access to sensitive information such as API keys, user information, and tokens stored in the database. The affected version is 1.27.14. |
Github GHSA |
GHSA-8j42-pcfm-3467 | SQL injection in litellm |
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Oct 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Litellm
Litellm litellm |
|
| CPEs | cpe:2.3:a:litellm:litellm:1.27.14:*:*:*:*:*:*:* | |
| Vendors & Products |
Litellm
Litellm litellm |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T20:55:10.325Z
Reserved: 2024-05-14T22:59:45.190Z
Link: CVE-2024-4890
Updated: 2024-08-01T20:55:10.325Z
Status : Modified
Published: 2024-06-06T19:16:03.630
Modified: 2024-11-21T09:43:48.113
Link: CVE-2024-4890
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA