PyPI: litellm

CVE-2026-35029

Safety vulnerability ID: SFTY-20260403-20736

Safety legacy ID: pyup.io-91740

Affected versions of the litellm package are vulnerable to Privilege Escalation due to missing admin role authorisation on the /config/update endpoint. This endpoint allows any authenticated user to modify proxy configuration and environment variables, register custom pass-through endpoint handlers pointing to attacker-controlled Python code, read arbitrary server files via the UI_LOGO_PATH setting, and overwrite privileged account credentials by modifying UI_USERNAME and UI_PASSWORD environment variables. An authenticated low-privilege attacker can exploit this endpoint to achieve Remote Code Execution, read sensitive server files, or take over administrator accounts without requiring proxy_admin role privileges.

Created at: May 6, 2026Updated at: May 6, 2026

Overview

LiteLLM: Privilege escalation via unrestricted proxy configuration endpoint

Advisory

Affected versions of the litellm package are vulnerable to Privilege Escalation due to missing admin role authorisation on the /config/update endpoint. This endpoint allows any authenticated user to modify proxy configuration and environment variables, register custom pass-through endpoint handlers pointing to attacker-controlled Python code, read arbitrary server files via the UI_LOGO_PATH setting, and overwrite privileged account credentials by modifying UI_USERNAME and UI_PASSWORD environment variables. An authenticated low-privilege attacker can exploit this endpoint to achieve Remote Code Execution, read sensitive server files, or take over administrator accounts without requiring proxy_admin role privileges.

Affected Package

Affecting litellm package, versions
<1.83.0

Also affects

---

How to Fix

Upgrade
litellm
to
1.83.0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more