Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5751: CWE-94 Improper Control of Generation of Code in berriai berriai/litellm

0
Critical
VulnerabilityCVE-2024-5751cvecve-2024-5751cwe-94
Published: Thu Jun 27 2024 (06/27/2024, 18:40:49 UTC)
Source: CVE Database V5
Vendor/Project: berriai
Product: berriai/litellm

Description

BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the `add_deployment` function, which decodes and decrypts environment variables from base64 and assigns them to `os.environ`. An attacker can exploit this by sending a malicious payload to the `/config/update` endpoint, which is then processed and executed by the server when the `get_secret` function is triggered. This requires the server to use Google KMS and a database to store a model.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:32:22 UTC

Technical Analysis

CVE-2024-5751 is a critical vulnerability found in berriai/litellm version v1.35.8, categorized under CWE-94 (Improper Control of Generation of Code). The vulnerability exists in the add_deployment function, which processes environment variables by decoding and decrypting base64-encoded data, then assigns these values directly to the operating system environment variables (os.environ). This process lacks sufficient validation or sanitization, allowing an attacker to craft a malicious payload that, when sent to the /config/update endpoint, is processed and executed by the server. The attack vector does not require authentication or user interaction, making it remotely exploitable over the network. The vulnerability specifically requires the server to be configured with Google Key Management Service (KMS) and a database to store a model, which are prerequisites for the vulnerable code path to be triggered. Upon exploitation, the attacker can execute arbitrary code with the privileges of the application, potentially leading to full system compromise, data theft, or further lateral movement. The CVSS v3.0 score of 9.8 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability, and ease of exploitation due to no required privileges or user interaction. No known exploits are currently reported in the wild, but the severity and simplicity of exploitation make this a high-risk vulnerability requiring urgent attention.

Potential Impact

For European organizations, the impact of CVE-2024-5751 is severe. Organizations using berriai/litellm for AI or machine learning model management, particularly those integrating Google KMS for secrets management, are at risk of remote code execution attacks. Successful exploitation can lead to complete system compromise, exposing sensitive data, intellectual property, and potentially critical infrastructure controls. This could disrupt business operations, cause data breaches subject to GDPR penalties, and damage organizational reputation. The vulnerability's remote and unauthenticated nature increases the likelihood of exploitation by cybercriminals or state-sponsored actors targeting European entities. Given the growing adoption of AI tools and cloud-based key management in Europe, the threat could affect sectors such as finance, healthcare, government, and technology. The lack of known exploits currently provides a window for proactive mitigation, but the critical severity demands immediate response to prevent potential attacks.

Mitigation Recommendations

1. Immediately update berriai/litellm to a patched version once available from the vendor. Monitor vendor advisories for official patches. 2. Until a patch is released, restrict access to the /config/update endpoint using network-level controls such as firewalls or API gateways to limit exposure to trusted IP addresses only. 3. Implement strict input validation and sanitization on all inputs processed by add_deployment, especially those involving environment variable assignments. 4. Review and harden the use of Google KMS and database configurations to ensure minimal privileges and audit logging are enabled. 5. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious payloads targeting the vulnerable endpoint. 6. Conduct thorough security audits and penetration testing focused on the deployment and configuration of berriai/litellm instances. 7. Monitor logs and alerts for unusual activity related to environment variable changes or calls to get_secret function. 8. Educate DevOps and security teams about the risks of improper code generation and environment variable handling to prevent similar vulnerabilities in custom code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-06-07T16:33:15.277Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b28178f764e1f470cab

Added to database: 10/15/2025, 1:01:28 PM

Last enriched: 10/15/2025, 1:32:22 PM

Last updated: 10/16/2025, 2:53:21 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats