BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' mark, with the last part considered the function name and the remaining part appended with the '.py' extension and imported. This allows an attacker to set a system method, such as 'os.system', as a callback, enabling the execution of arbitrary commands when a chat response is processed.
References
Link | Resource |
---|---|
https://huntr.com/bounties/1d98bebb-6cf4-46c9-87c3-d3b1972973b5 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Jul 2025, 14:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Litellm
Litellm litellm |
|
References | () https://huntr.com/bounties/1d98bebb-6cf4-46c9-87c3-d3b1972973b5 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:litellm:litellm:1.65.4:dev2:*:*:*:*:*:* cpe:2.3:a:litellm:litellm:*:*:*:*:*:*:*:* |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-15 14:57
NVD link : CVE-2024-6825
Mitre link : CVE-2024-6825
CVE.ORG link : CVE-2024-6825
JSON object : View
Products Affected
litellm
- litellm
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')