BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the `/completions` endpoint. The vulnerability arises from the `hf_chat_template` method processing the `chat_template` parameter from the `tokenizer_config.json` file through the Jinja template engine without proper sanitization. Attackers can exploit this by crafting malicious `tokenizer_config.json` files that execute arbitrary code on the server.
References
Link | Resource |
---|---|
https://github.com/berriai/litellm/commit/8a1cdc901708b07b7ff4eca20f9cb0f1f0e8d0b3 | Patch |
https://huntr.com/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4 | Exploit Third Party Advisory |
https://github.com/berriai/litellm/commit/8a1cdc901708b07b7ff4eca20f9cb0f1f0e8d0b3 | Patch |
https://huntr.com/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4 | Exploit Third Party Advisory |
Configurations
History
15 Jul 2025, 14:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/berriai/litellm/commit/8a1cdc901708b07b7ff4eca20f9cb0f1f0e8d0b3 - Patch | |
References | () https://huntr.com/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:litellm:litellm:*:*:*:*:*:*:*:* | |
First Time |
Litellm
Litellm litellm |
Information
Published : 2024-04-10 17:15
Updated : 2025-07-15 14:21
NVD link : CVE-2024-2952
Mitre link : CVE-2024-2952
CVE.ORG link : CVE-2024-2952
JSON object : View
Products Affected
litellm
- litellm
CWE
CWE-76
Improper Neutralization of Equivalent Special Elements