BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' mark, with the last part considered the function name and the remaining part appended with the '.py' extension and imported. This allows an attacker to set a system method, such as 'os.system', as a callback, enabling the execution of arbitrary commands when a chat response is processed.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Litellm
Litellm litellm |
|
CPEs | cpe:2.3:a:litellm:litellm:*:*:*:*:*:*:*:* cpe:2.3:a:litellm:litellm:1.65.4:dev2:*:*:*:*:*:* |
|
Vendors & Products |
Litellm
Litellm litellm |
Thu, 20 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' mark, with the last part considered the function name and the remaining part appended with the '.py' extension and imported. This allows an attacker to set a system method, such as 'os.system', as a callback, enabling the execution of arbitrary commands when a chat response is processed. | |
Title | Remote Code Execution in BerriAI/litellm | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:11:36.172Z
Updated: 2025-03-20T13:43:00.744Z
Reserved: 2024-07-16T23:27:36.399Z
Link: CVE-2024-6825

Updated: 2025-03-20T13:42:55.312Z

Status : Analyzed
Published: 2025-03-20T10:15:33.237
Modified: 2025-07-15T14:57:14.573
Link: CVE-2024-6825

No data.