Vulnerability Description
An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/berriai/litellm/commit/566d9354aab4215091b2e51ad0333e948125fa
- https://huntr.com/bounties/6c0e2f75-2d03-42f9-9530-e16a973317fc
FAQ
What is CVE-2025-0628?
CVE-2025-0628 is a vulnerability with a CVSS score of 8.1 (HIGH). An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an over...
How severe is CVE-2025-0628?
CVE-2025-0628 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-0628?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.