LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI.
| Vendor | Product | Versions |
|---|---|---|
| berriai | litellm | bb0639701796218a3447160e55c0f1097446e4e6085df7dfd39f476d4143743f, main-latest (docker image ghcr.io/berriai/litellm:main-latest, repo digest ghcr.io/berriai/litellm@sha256:bb0639701796218a3447160e55c0f1097446e4e6085df7dfd39f476d4143743f) |
Updated severity to CRITICAL and marked the vulnerability as actively exploited.
Initial creation