CVE-2025-45809

Medium
|5.4
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows attackers to run unauthorized commands on the BerriAI LiteLLM system by manipulating the key parameter in specific API calls. It affects versions before 1.81.0, meaning users need to update their software to protect against this risk.

Technical Description

SQL Injection vulnerability in BerriAI LiteLLM before 1.81.0 allows attackers to execute arbitrary commands via the key parameter to the "/key/block" and "/key/unblock" API endpoints.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$741($500-$1K)
Vendor Response
Grade FPatched in 251 days

Quick Information

Published

Jul 3, 2025

9 months ago

Last Modified

Mar 12, 2026

26 days ago

Vendor

litellm

Product

litellm