Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42271— LiteLLM: Authenticated command execution via MCP stdio test endpoints

EPSS 0.05% · P16
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42271

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
LiteLLM: Authenticated command execution via MCP stdio test endpoints
Source: NVD (National Vulnerability Database)
Vulnerability Description
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.74.2 to before version 1.83.7, two endpoints used to preview an MCP server before saving it — POST /mcp-rest/test/connection and POST /mcp-rest/test/tools/list — accepted a full server configuration in the request body, including the command, args, and env fields used by the stdio transport. When called with a stdio configuration, the endpoints attempted to connect, which spawned the supplied command as a subprocess on the proxy host with the privileges of the proxy process. The endpoints were gated only by a valid proxy API key, with no role check. Any authenticated user — including holders of low-privilege internal-user keys — could therefore run arbitrary commands on the host. This issue has been patched in version 1.83.7.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
LiteLLM 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
LiteLLM是Berri AI开源的一个应用程序。可以使用 OpenAI 格式调用所有 LLM API。 LiteLLM 1.74.2版本至1.83.7之前版本存在命令注入漏洞,该漏洞源于两个用于预览MCP服务器的端点接受请求体中的完整服务器配置,包括stdio传输使用的命令、参数和环境字段,当使用stdio配置调用时端点尝试连接并生成子进程,端点仅由有效代理API密钥保护而无角色检查,任何认证用户均可运行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
BerriAIlitellm >= 1.74.2, < 1.83.7 -

II. Public POCs for CVE-2026-42271

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42271

登录查看更多情报信息。

Same Patch Batch · BerriAI · 2026-05-08 · 3 CVEs total

CVE-2026-42203LiteLLM: Server-Side Template Injection in /prompts/test endpoint
CVE-2026-42208LiteLLM: SQL injection in Proxy API key verification

IV. Related Vulnerabilities

V. Comments for CVE-2026-42271

No comments yet


Leave a comment