Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. litellm
  4. ›
  5. GHSA-69x8-hrgq-fjj8

GHSA-69x8-hrgq-fjj8: LiteLLM: Password hash exposure and pass-the-hash authentication bypass

April 8, 2026

Three issues combine into a full authentication bypass chain:

  1. Weak hashing: User passwords are stored as unsalted SHA-256 hashes, making them vulnerable to rainbow table attacks and trivially identifying users with identical passwords.
  2. Hash exposure: Multiple API endpoints (/user/info, /user/update, /spend/users) return the password hash field in responses to any authenticated user regardless of role. Plaintext passwords could also potentially be exposed in certain scenarios.
  3. Pass-the-hash: The /v2/login endpoint accepts the raw SHA-256 hash as a valid password without re-hashing, allowing direct login with a stolen

An already authenticated user can retrieve another user’s password hash from the API and use it to log in as that user. This enables full privilege escalation in three HTTP requests.

References

  • github.com/BerriAI/litellm
  • github.com/BerriAI/litellm/security/advisories/GHSA-69x8-hrgq-fjj8
  • github.com/advisories/GHSA-69x8-hrgq-fjj8

Code Behaviors & Features

Detect and mitigate GHSA-69x8-hrgq-fjj8 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.83.0

Fixed versions

  • 1.83.0

Solution

Upgrade to version 1.83.0 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm
  • CWE-916: Use of Password Hash With Insufficient Computational Effort

Source file

pypi/litellm/GHSA-69x8-hrgq-fjj8.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:18 +0000.