Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. litellm
  4. ›
  5. CVE-2024-4888

CVE-2024-4888: Arbitrary file deletion in litellm

June 6, 2024 (updated November 4, 2024)

BerriAI’s litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the /audio/transcriptions endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where os.remove(file.filename) is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.

References

  • github.com/BerriAI/litellm
  • github.com/BerriAI/litellm/pull/3193
  • github.com/advisories/GHSA-3xr8-qfvj-9p9j
  • huntr.com/bounties/48461d89-cf13-4ad3-a43e-0d37da08fc6c
  • nvd.nist.gov/vuln/detail/CVE-2024-4888

Code Behaviors & Features

Detect and mitigate CVE-2024-4888 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.35.36

Fixed versions

  • 1.35.36

Solution

Upgrade to version 1.35.36 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation
  • CWE-862: Missing Authorization

Source file

pypi/litellm/CVE-2024-4888.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:35 +0000.