BotBeat
...
← Back

> ▌

LiteLLMLiteLLM
POLICY & REGULATIONLiteLLM2026-04-22

Critical RCE Vulnerability Discovered in LiteLLM Proxy—Immediate Upgrade Required

Key Takeaways

  • ▸Critical RCE vulnerability in LiteLLM Proxy affects versions 1.81.16–1.83.6 and requires immediate upgrade to v1.83.7-stable
  • ▸The exploit chains two vulnerabilities to grant unauthenticated attackers root-level access on PostgreSQL-backed deployments
  • ▸All users should prioritize upgrading; interim mitigations include disabling error logs, blocking vulnerable endpoints, and restricting network access
Source:
Hacker Newshttps://aisafe.io/blog/critical-rce-vulnerability-in-litellm-proxy↗

Summary

Security researchers at AISafe have discovered a critical remote code execution (RCE) vulnerability in LiteLLM Proxy, a widely-used open-source gateway that unifies over 100 LLM providers behind a single OpenAI-compatible API. The vulnerability, affecting versions 1.81.16 through 1.83.6, chains two separate flaws to allow unauthenticated attackers to achieve root-level access on default deployments using PostgreSQL backends. The researchers have published technical details and proof-of-concept code, prompting immediate action from the LiteLLM maintainers.

LiteLLM Proxy is a critical infrastructure component used by thousands of organizations as a gateway between applications and major LLM providers including OpenAI, Anthropic, and Azure. With over 40,000 GitHub stars, the project's widespread adoption makes the vulnerability particularly concerning. The maintainers have released version 1.83.7-stable with patches addressing both identified security flaws (GHSA-r75f-5x8p-qvmc and GHSA-xqmj-j6mv-4862).

AISafe recommends all affected users upgrade immediately to v1.83.7-stable or implement interim mitigations including disabling error logs, blocking the vulnerable POST /prompts/test endpoint, and restricting network access behind an authentication layer. The vulnerability was discovered as part of AISafe's automated security scanning platform and carries significant implications given LiteLLM's status as a target in Pwn2Own Berlin 2026's AI category.

  • LiteLLM Proxy is widely deployed across thousands of organizations as a gateway for 100+ LLM providers, making the vulnerability's scope significant
MLOps & InfrastructureCybersecurityOpen Source

More from LiteLLM

LiteLLMLiteLLM
POLICY & REGULATION

Security Postmortem: Multiple Failures Led to LiteLLM Compromise

2026-04-10
LiteLLMLiteLLM
POLICY & REGULATION

Critical Supply Chain Attack: LiteLLM PyPI Compromise Exposes Millions of Developers

2026-04-02
LiteLLMLiteLLM
POLICY & REGULATION

LiteLLM Supply Chain Compromise: Malicious Package Deployed Credential Harvesting and Backdoor Access

2026-03-31

Comments

Suggested

OpenAIOpenAI
PRODUCT LAUNCH

OpenAI's Stargate 'Freebird' Data Center in Milam, Texas to Span Nearly 550,000 Square Feet

2026-04-22
Independent ResearchIndependent Research
RESEARCH

Parallel Token Prediction Framework Enables Efficient Multi-Token Generation in Language Models

2026-04-22
N/AN/A
RESEARCH

Security Researchers Expose AI-Enabled Device Code Phishing Campaign Targeting IT Workers

2026-04-22
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us