<0.1% probability · 14.3th percentile — 2026-05-08
Affected versions
LiteLLM 1.80.5 to before 1.83.7
Summary
This vulnerability allows any authenticated user with a valid LiteLLM API key to execute arbitrary code on the proxy host. The /prompts/test endpoint renders user-supplied prompt templates without sandboxing, enabling code execution within the proxy process. Successful exploitation can expose sensitive environment secrets like API keys and lead to full host compromise.
Remediation
Update LiteLLM to version 1.83.7 or later immediately. Block access to the /prompts/test endpoint from untrusted networks until the update is applied. Rotate any stored API keys and credentials if you ran a vulnerable version of LiteLLM.
TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.