Safety vulnerability ID: 71651
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of BerriAI's litellm are vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.
Latest version: 1.52.14
Library to easily interface with LLM API providers
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application