Safety vulnerability ID: 71721
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of Litellm are vulnerable to blind SQL Injection. This vulnerability in the '/team/update' endpoint allows attackers to inject malicious SQL commands through the 'user_id' parameter, potentially leading to unauthorized access to sensitive data including API keys, user information, and tokens. The flaw stems from improper handling of user input in raw SQL queries. The patch replaces vulnerable raw SQL queries with parameterized queries using Prisma ORM, effectively preventing SQL injection attacks.
Latest version: 1.52.14
Library to easily interface with LLM API providers
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application