CVE-2025-0628: CWE-266 Incorrect Privilege Assignment in berriai berriai/litellm
An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN.
AI Analysis
Technical Summary
CVE-2025-0628 identifies an incorrect privilege assignment vulnerability (CWE-266) in the BerriAI litellm application. Specifically, users assigned the 'internal_user_viewer' role are erroneously provisioned with API keys that grant them full administrative access, including endpoints that manage user data and administrative functions. This improper authorization flaw allows any user with this role to escalate their privileges to a PROXY ADMIN level, bypassing intended access controls. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only low privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality and integrity is high, as attackers can access sensitive user information and modify administrative settings. Availability impact is not significant. The vulnerability affects unspecified versions of litellm, and no patches or exploit code are currently publicly available. The flaw stems from a failure in enforcing least privilege principles during API key generation and role assignment, highlighting a critical security design oversight in the authorization mechanism of the application.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive user data and administrative controls within the litellm application. This could result in data breaches, unauthorized user management, and potential manipulation or disruption of services relying on litellm. Organizations in sectors such as finance, healthcare, and government that use BerriAI products may face regulatory compliance violations under GDPR due to unauthorized data exposure. The ability to escalate privileges without user interaction increases the risk of automated or stealthy attacks, potentially compromising internal systems and sensitive information. Additionally, the breach of administrative functions could facilitate further lateral movement within networks, amplifying the overall security risk and operational impact.
Mitigation Recommendations
1. Immediately audit all API keys issued to users with the 'internal_user_viewer' role and revoke any keys with excessive privileges. 2. Implement strict role-based access control (RBAC) policies ensuring that API keys are generated with the principle of least privilege, limiting access strictly to necessary endpoints. 3. Introduce multi-factor authentication (MFA) for administrative functions to add an additional security layer. 4. Monitor API usage logs for unusual access patterns, especially calls to administrative endpoints from accounts with viewer roles. 5. Engage with BerriAI to obtain patches or updates addressing this vulnerability as soon as they become available. 6. Conduct a thorough security review of authorization mechanisms within litellm and related applications to identify and remediate similar privilege assignment issues. 7. Educate internal teams about the risk and signs of privilege escalation attacks to enhance detection and response capabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-0628: CWE-266 Incorrect Privilege Assignment in berriai berriai/litellm
Description
An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN.
AI-Powered Analysis
Technical Analysis
CVE-2025-0628 identifies an incorrect privilege assignment vulnerability (CWE-266) in the BerriAI litellm application. Specifically, users assigned the 'internal_user_viewer' role are erroneously provisioned with API keys that grant them full administrative access, including endpoints that manage user data and administrative functions. This improper authorization flaw allows any user with this role to escalate their privileges to a PROXY ADMIN level, bypassing intended access controls. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only low privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality and integrity is high, as attackers can access sensitive user information and modify administrative settings. Availability impact is not significant. The vulnerability affects unspecified versions of litellm, and no patches or exploit code are currently publicly available. The flaw stems from a failure in enforcing least privilege principles during API key generation and role assignment, highlighting a critical security design oversight in the authorization mechanism of the application.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive user data and administrative controls within the litellm application. This could result in data breaches, unauthorized user management, and potential manipulation or disruption of services relying on litellm. Organizations in sectors such as finance, healthcare, and government that use BerriAI products may face regulatory compliance violations under GDPR due to unauthorized data exposure. The ability to escalate privileges without user interaction increases the risk of automated or stealthy attacks, potentially compromising internal systems and sensitive information. Additionally, the breach of administrative functions could facilitate further lateral movement within networks, amplifying the overall security risk and operational impact.
Mitigation Recommendations
1. Immediately audit all API keys issued to users with the 'internal_user_viewer' role and revoke any keys with excessive privileges. 2. Implement strict role-based access control (RBAC) policies ensuring that API keys are generated with the principle of least privilege, limiting access strictly to necessary endpoints. 3. Introduce multi-factor authentication (MFA) for administrative functions to add an additional security layer. 4. Monitor API usage logs for unusual access patterns, especially calls to administrative endpoints from accounts with viewer roles. 5. Engage with BerriAI to obtain patches or updates addressing this vulnerability as soon as they become available. 6. Conduct a thorough security review of authorization mechanisms within litellm and related applications to identify and remediate similar privilege assignment issues. 7. Educate internal teams about the risk and signs of privilege escalation attacks to enhance detection and response capabilities.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-01-21T19:10:36.300Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b30178f764e1f470f1c
Added to database: 10/15/2025, 1:01:36 PM
Last enriched: 10/15/2025, 1:03:36 PM
Last updated: 1/19/2026, 6:19:10 AM
Views: 174
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighCVE-2026-1139: Buffer Overflow in UTT 进取 520W
HighCVE-2026-1138: Buffer Overflow in UTT 进取 520W
HighCVE-2026-1137: Buffer Overflow in UTT 进取 520W
HighCVE-2026-1136: Cross Site Scripting in lcg0124 BootDo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.