CVE-2026-47101
Received Received - Intake
Privilege Escalation in LiteLLM via API Key Misconfiguration

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: VulnCheck

Description
LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API keys with access to routes that their role does not permit. When generating a key, the allowed_routes field is stored without verifying that the specified routes fall within the user's own permissions. A key created with access to admin-only routes can then be used to reach those routes successfully, bypassing the role-based access controls that would otherwise block the request, enabling full privilege escalation from internal_user to proxy_admin.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
litellm litellm to 1.83.14 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in LiteLLM versions prior to 1.83.14 and allows an authenticated internal user to create API keys that grant access to routes beyond their assigned permissions.

When generating an API key, the system does not verify whether the specified allowed routes fall within the user's own role permissions.

As a result, a user can create a key with access to admin-only routes and use it to bypass role-based access controls, effectively escalating their privileges from an internal user to a proxy administrator.


How can this vulnerability impact me? :

This vulnerability can lead to full privilege escalation, allowing an internal user to gain unauthorized administrative access.

An attacker exploiting this flaw could perform actions reserved for administrators, potentially compromising the confidentiality, integrity, and availability of the system.

This could result in unauthorized data access, modification, or deletion, as well as disruption of services.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart