Home » Database

AVID-2026-R1590

Description

Remote Code Execution in BerriAI/litellm (CVE-2024-6825)

Details

BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the ‘post_call_rules’ configuration, where a callback function can be added. The provided value is split at the final ‘.’ mark, with the last part considered the function name and the remaining part appended with the ‘.py’ extension and imported. This allows an attacker to set a system method, such as ‘os.system’, as a callback, enabling the execution of arbitrary commands when a chat response is processed.

Reason for inclusion in AVID: The CVE describes a remote code execution vulnerability in the litellm library (used in AI pipelines), enabling arbitrary code execution via mis-handled callbacks. This is a software vulnerability in a component commonly used to build/deploy AI systems, i.e., a general-purpose AI software supply chain issue. It has explicit security impact (RCE) with high severity and the report provides detailed description, CVSS metrics, and references.

References

Affected or Relevant Artifacts

  • Developer: berriai
  • Deployer: berriai
  • Artifact Details:
TypeName
Systemberriai/litellm

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score8.8
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-94CWE-94 Improper Control of Generation of Code

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry