CVE-2025-45809
Medium
|5.4No Exploit
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to run unauthorized commands on the BerriAI LiteLLM system by manipulating the key parameter in specific API calls. It affects versions before 1.81.0, meaning users need to update their software to protect against this risk.
Technical Description
SQL Injection vulnerability in BerriAI LiteLLM before 1.81.0 allows attackers to execute arbitrary commands via the key parameter to the "/key/block" and "/key/unblock" API endpoints.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$741($500-$1K)
Vendor Response
Grade FPatched in 251 days
Quick Information
Published
Jul 3, 2025
9 months ago
Last Modified
Mar 12, 2026
26 days ago
Vendor
litellm
Product
litellm