CVE-2025-0628: CWE-266 Incorrect Privilege Assignment in berriai berriai/litellm
An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN.
AI Analysis
Technical Summary
CVE-2025-0628 identifies an incorrect privilege assignment vulnerability (CWE-266) in the BerriAI litellm application. Specifically, users assigned the 'internal_user_viewer' role are erroneously provisioned with API keys that grant them full administrative access, including endpoints that manage user data and administrative functions. This improper authorization flaw allows any user with this role to escalate their privileges to a PROXY ADMIN level, bypassing intended access controls. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only low privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality and integrity is high, as attackers can access sensitive user information and modify administrative settings. Availability impact is not significant. The vulnerability affects unspecified versions of litellm, and no patches or exploit code are currently publicly available. The flaw stems from a failure in enforcing least privilege principles during API key generation and role assignment, highlighting a critical security design oversight in the authorization mechanism of the application.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive user data and administrative controls within the litellm application. This could result in data breaches, unauthorized user management, and potential manipulation or disruption of services relying on litellm. Organizations in sectors such as finance, healthcare, and government that use BerriAI products may face regulatory compliance violations under GDPR due to unauthorized data exposure. The ability to escalate privileges without user interaction increases the risk of automated or stealthy attacks, potentially compromising internal systems and sensitive information. Additionally, the breach of administrative functions could facilitate further lateral movement within networks, amplifying the overall security risk and operational impact.
Mitigation Recommendations
1. Immediately audit all API keys issued to users with the 'internal_user_viewer' role and revoke any keys with excessive privileges. 2. Implement strict role-based access control (RBAC) policies ensuring that API keys are generated with the principle of least privilege, limiting access strictly to necessary endpoints. 3. Introduce multi-factor authentication (MFA) for administrative functions to add an additional security layer. 4. Monitor API usage logs for unusual access patterns, especially calls to administrative endpoints from accounts with viewer roles. 5. Engage with BerriAI to obtain patches or updates addressing this vulnerability as soon as they become available. 6. Conduct a thorough security review of authorization mechanisms within litellm and related applications to identify and remediate similar privilege assignment issues. 7. Educate internal teams about the risk and signs of privilege escalation attacks to enhance detection and response capabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-0628: CWE-266 Incorrect Privilege Assignment in berriai berriai/litellm
Description
An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN.
AI-Powered Analysis
Technical Analysis
CVE-2025-0628 identifies an incorrect privilege assignment vulnerability (CWE-266) in the BerriAI litellm application. Specifically, users assigned the 'internal_user_viewer' role are erroneously provisioned with API keys that grant them full administrative access, including endpoints that manage user data and administrative functions. This improper authorization flaw allows any user with this role to escalate their privileges to a PROXY ADMIN level, bypassing intended access controls. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only low privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality and integrity is high, as attackers can access sensitive user information and modify administrative settings. Availability impact is not significant. The vulnerability affects unspecified versions of litellm, and no patches or exploit code are currently publicly available. The flaw stems from a failure in enforcing least privilege principles during API key generation and role assignment, highlighting a critical security design oversight in the authorization mechanism of the application.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive user data and administrative controls within the litellm application. This could result in data breaches, unauthorized user management, and potential manipulation or disruption of services relying on litellm. Organizations in sectors such as finance, healthcare, and government that use BerriAI products may face regulatory compliance violations under GDPR due to unauthorized data exposure. The ability to escalate privileges without user interaction increases the risk of automated or stealthy attacks, potentially compromising internal systems and sensitive information. Additionally, the breach of administrative functions could facilitate further lateral movement within networks, amplifying the overall security risk and operational impact.
Mitigation Recommendations
1. Immediately audit all API keys issued to users with the 'internal_user_viewer' role and revoke any keys with excessive privileges. 2. Implement strict role-based access control (RBAC) policies ensuring that API keys are generated with the principle of least privilege, limiting access strictly to necessary endpoints. 3. Introduce multi-factor authentication (MFA) for administrative functions to add an additional security layer. 4. Monitor API usage logs for unusual access patterns, especially calls to administrative endpoints from accounts with viewer roles. 5. Engage with BerriAI to obtain patches or updates addressing this vulnerability as soon as they become available. 6. Conduct a thorough security review of authorization mechanisms within litellm and related applications to identify and remediate similar privilege assignment issues. 7. Educate internal teams about the risk and signs of privilege escalation attacks to enhance detection and response capabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-01-21T19:10:36.300Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b30178f764e1f470f1c
Added to database: 10/15/2025, 1:01:36 PM
Last enriched: 10/15/2025, 1:03:36 PM
Last updated: 12/4/2025, 12:47:22 PM
Views: 147
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11222: na in LINE Corporation Central Dogma
MediumCVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.