CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
20.0%
SSVC
Exploitation
poc
Automatable
no
Technical Impact
total
An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the /global/spend/logs
endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidated api_key
parameter directly into the query, making it susceptible to SQL Injection if the api_key
contains malicious data. This issue affects the latest version of the repository. Successful exploitation of this vulnerability could lead to unauthorized access, data manipulation, exposure of confidential information, and denial of service (DoS).
[
{
"vendor": "berriai",
"product": "berriai/litellm",
"versions": [
{
"status": "affected",
"version": "unspecified",
"versionType": "custom",
"lessThanOrEqual": "latest"
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
20.0%
SSVC
Exploitation
poc
Automatable
no
Technical Impact
total