Impact
LiteLLM versions before 1.83.14 allow a user with an internal_user role to generate API keys that include routes exceeding the user's permissions. The allowed_routes field is stored without verifying that the requested routes fall within the authenticated user's own authority. A key created with access to admin‑only routes can then be used to reach those routes successfully, bypassing the role‑based access controls that would otherwise block the request, thereby enabling full privilege escalation from internal_user to proxy_admin. This is a CWE‑863 vulnerability.
Affected Systems
The vulnerability affects the BerriAI LiteLLM product in all releases prior to 1.83.14. Any installation that still uses these versions and permits authenticated internal_user accounts to request API keys is susceptible.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity risk. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated internal_user account; the attacker can create a rogue API key through the normal key‑generation endpoint and then use that key to access administrative routes that the user would not normally be able to reach.
OpenCVE Enrichment