CVE-2026-47102

LiteLLM · LiteLLM

A vulnerability in LiteLLM prior to version 1 allows for potential unauthorized actions or information disclosure within the platform.

Executive summary

A high-severity vulnerability in LiteLLM prior to version 1 necessitates an immediate upgrade to ensure the security and integrity of the application.

Vulnerability

The vulnerability exists in versions of LiteLLM prior to 1. The specific nature of the flaw allows for potential exploitation by an attacker to bypass intended security controls, though the exact entry point depends on the specific deployment configuration.

Business impact

Exploitation of this vulnerability could lead to the compromise of data handled by the LLM integration or unauthorized control over the platform's functions. With a CVSS score of 8.8, this represents a significant threat to business operations that rely on LiteLLM, requiring immediate mitigation.

Remediation

Immediate Action: Upgrade all instances of LiteLLM to version 1 or the latest available secure version immediately.

Proactive Monitoring: Monitor application logs for unauthorized API requests or suspicious behavior originating from the LiteLLM integration.

Compensating Controls: Implement strict API key management and restrict access to the LiteLLM service to authorized internal networks only.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations utilizing LiteLLM should treat this as a high-priority update. Administrators must verify their current version and upgrade to version 1 or higher immediately to protect the application from potential exploitation.