Cyber Posture

CVE-2026-35029

High

Published: 06 April 2026

Published
06 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1330 94.2th percentile
Risk Priority 26 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.

Security Summary

CVE-2026-35029 is an authorization bypass vulnerability in LiteLLM, a proxy server and AI Gateway used to call LLM APIs in OpenAI or native format. In versions prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization, allowing improper control over sensitive operations. This issue is classified under CWE-863 (Incorrect Authorization) and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.

An attacker with existing low-privilege authentication to the LiteLLM platform can exploit the vulnerable endpoint over the network with low complexity and no user interaction required. Successful exploitation enables modification of proxy configuration and environment variables, including registering custom pass-through endpoint handlers that point to attacker-controlled Python code for remote code execution. Additional impacts include reading arbitrary server files by setting the UI_LOGO_PATH environment variable and fetching via the /get_image endpoint, as well as taking over other privileged accounts by overwriting UI_USERNAME and UI_PASSWORD environment variables.

The vulnerability was addressed in LiteLLM version 1.83.0, which enforces proper admin role checks on the /config/update endpoint. Security practitioners should upgrade to this version or later. Additional details are available in the GitHub Security Advisory at https://github.com/BerriAI/litellm/security/advisories/GHSA-53mr-6c8q-9789.

Details

CWE(s)
CWE-863

Affected Products

litellm
litellm
≤ 1.83.0

AI Security Analysis

AI Category
APIs and Models
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: ai, llm, openai

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
Why these techniques?

CVE enables exploitation of public-facing proxy server (T1190) for authorization bypass, leading to Python RCE via custom handlers (T1059.006), arbitrary file reads (T1005), and account manipulation via credential overwrite (T1098).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References