Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5710: CWE-862 Missing Authorization in berriai berriai/litellm

0
Medium
VulnerabilityCVE-2024-5710cvecve-2024-5710cwe-862
Published: Thu Jun 27 2024 (06/27/2024, 18:41:19 UTC)
Source: CVE Database V5
Vendor/Project: berriai
Product: berriai/litellm

Description

berriai/litellm version 1.34.34 is vulnerable to improper access control in its team management functionality. This vulnerability allows attackers to perform unauthorized actions such as creating, updating, viewing, deleting, blocking, and unblocking any teams, as well as adding or deleting any member to or from any teams. The vulnerability stems from insufficient access control checks in various team management endpoints, enabling attackers to exploit these functionalities without proper authorization.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:31:56 UTC

Technical Analysis

CVE-2024-5710 is a vulnerability classified under CWE-862 (Missing Authorization) affecting berriai/litellm version 1.34.34. The issue lies in the team management functionality where access control checks are insufficient or missing on various endpoints. This flaw allows an attacker with low privileges to bypass authorization and perform unauthorized operations such as creating, updating, viewing, deleting, blocking, and unblocking any teams, as well as adding or removing any members from any teams. The vulnerability is network exploitable (AV:N) but requires low privileges (PR:L) and no user interaction (UI:N). The impact is primarily on integrity (I:H), as unauthorized modifications to team structures and memberships can disrupt organizational workflows and potentially lead to further privilege escalation or insider threats. Availability and confidentiality are not directly impacted. The CVSS score of 5.3 reflects a medium severity due to the requirement for some privileges and the complexity of exploitation. No patches are currently linked, and no known exploits have been reported in the wild, indicating the vulnerability is newly disclosed. Organizations using berriai/litellm should assess their exposure and implement compensating controls until patches are available.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of team management within berriai/litellm deployments. Unauthorized manipulation of teams and memberships can lead to disruption of collaboration, unauthorized access to sensitive projects, and potential insider threats if attackers add malicious actors to critical teams. This could affect sectors relying heavily on team-based workflows such as technology, finance, government, and research institutions. The lack of confidentiality and availability impact reduces the risk of data leakage or denial of service, but the integrity compromise could facilitate further attacks or data manipulation. Organizations with regulatory compliance requirements around access control and data integrity (e.g., GDPR, NIS2 Directive) may face compliance risks if this vulnerability is exploited. The medium severity rating suggests prioritization but not emergency response unless combined with other vulnerabilities or active exploitation.

Mitigation Recommendations

1. Monitor berriai/litellm vendor communications closely for official patches or updates addressing CVE-2024-5710 and apply them promptly. 2. Until patches are available, restrict access to team management endpoints to trusted administrators only, using network segmentation, firewall rules, or API gateways. 3. Implement strict role-based access controls (RBAC) within the application to limit team management capabilities to authorized personnel. 4. Conduct regular audits of team membership and management logs to detect unauthorized changes or suspicious activities. 5. Employ anomaly detection tools to flag unusual team creation, deletion, or membership modifications. 6. Educate administrators and users about the risks of privilege escalation and enforce the principle of least privilege. 7. If possible, disable or limit team management features temporarily in high-risk environments. 8. Integrate multi-factor authentication (MFA) for accounts with team management privileges to reduce risk of credential compromise. 9. Prepare incident response plans specific to unauthorized access or manipulation of team structures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-06-06T18:20:46.162Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b28178f764e1f470ca4

Added to database: 10/15/2025, 1:01:28 PM

Last enriched: 10/15/2025, 1:31:56 PM

Last updated: 10/16/2025, 1:04:42 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats