Safety vulnerability ID: 71723
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the litellm package are vulnerable to SQL Injection attacks due to improper input sanitization. The /global/spend/logs endpoint constructs an SQL query by directly concatenating the unvalidated api_key parameter into the query string without escaping or parameterization. This allows attackers to inject arbitrary SQL code by supplying specially crafted input through the api_key parameter. Successful exploitation may lead to unauthorized data access, manipulation of database contents, exposure of sensitive information, or a Denial of Service (DoS) condition.
Latest version: 1.78.0
Library to easily interface with LLM API providers
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application