CVE-2024-4888: litellm: arbitrary file deletion via audio endpoint
HIGH PoC AVAILABLE CISA: TRACK*If your team runs litellm as an LLM gateway or proxy, treat this as critical: any authenticated user can delete arbitrary server files—SSH keys, config files, SQLite databases—with a single crafted API call. Patch to the latest litellm release immediately, or block the /audio/transcriptions endpoint at the reverse proxy layer. No special skill is required; the attack is a one-liner.
Risk Assessment
High risk (CVSS 8.1). litellm is a widely-deployed LLM proxy used to route traffic to OpenAI, Anthropic, and other providers. The vulnerability requires only low-privilege API credentials—typically any valid API key—with no user interaction and low attack complexity. Network-accessible by design, it offers attackers a trivially simple path to destructive impact (Integrity: High, Availability: High). Multi-tenant or shared litellm instances face compounded risk: one compromised API key can destroy shared infrastructure for all users.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| litellm | pip | — | No patch |
Do you use litellm? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Patch: Upgrade litellm to the latest release; validate the fix via the huntr advisory and changelog before deploying.
-
Network control: Restrict /audio/transcriptions to trusted internal IP ranges via reverse proxy (nginx/Caddy) as an immediate compensating control.
-
Least privilege: Run litellm as a non-root user with minimal filesystem permissions scoped to its working directory only.
-
Detection: Alert on unexpected file deletions in sensitive directories (/root/.ssh, /etc, app data dirs); monitor API logs for multipart/form-data requests to /audio/transcriptions with suspicious filename fields containing path separators.
-
Recovery readiness: Verify SSH keys and critical configs are backed up and recoverable before relying on patching alone.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-4888?
If your team runs litellm as an LLM gateway or proxy, treat this as critical: any authenticated user can delete arbitrary server files—SSH keys, config files, SQLite databases—with a single crafted API call. Patch to the latest litellm release immediately, or block the /audio/transcriptions endpoint at the reverse proxy layer. No special skill is required; the attack is a one-liner.
Is CVE-2024-4888 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-4888, increasing the risk of exploitation.
How to fix CVE-2024-4888?
1. Patch: Upgrade litellm to the latest release; validate the fix via the huntr advisory and changelog before deploying. 2. Network control: Restrict /audio/transcriptions to trusted internal IP ranges via reverse proxy (nginx/Caddy) as an immediate compensating control. 3. Least privilege: Run litellm as a non-root user with minimal filesystem permissions scoped to its working directory only. 4. Detection: Alert on unexpected file deletions in sensitive directories (/root/.ssh, /etc, app data dirs); monitor API logs for multipart/form-data requests to /audio/transcriptions with suspicious filename fields containing path separators. 5. Recovery readiness: Verify SSH keys and critical configs are backed up and recoverable before relying on patching alone.
What systems are affected by CVE-2024-4888?
This vulnerability affects the following AI/ML architecture patterns: LLM gateways and proxies, model serving, API gateways, agent frameworks.
What is the CVSS score for CVE-2024-4888?
CVE-2024-4888 has a CVSS v3.1 base score of 8.1 (HIGH). The EPSS exploitation probability is 0.06%.
Technical Details
NVD Description
BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.
Exploitation Scenario
An attacker with a low-privilege litellm API key—obtained via credential stuffing, a leaked key in a public GitHub repository, or insider access—sends a POST request to /audio/transcriptions with a crafted multipart/form-data payload. Instead of a valid audio file, the filename field contains a path such as '../../.ssh/authorized_keys' or '/var/lib/litellm/litellm.db'. The server calls os.remove(file.filename) without any path validation or authorization check, silently deleting the targeted file. The attacker iterates through predictable high-value paths—SSH keys, the litellm database, environment files containing upstream API keys—causing service disruption, admin lockout, and destruction of audit trails, all while appearing as a legitimate API caller.
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H References
- huntr.com/bounties/48461d89-cf13-4ad3-a43e-0d37da08fc6c Exploit 3rd Party
- github.com/fkie-cad/nvd-json-data-feeds Exploit
Timeline
Related Vulnerabilities
CVE-2026-42208 9.8 LiteLLM: SQL injection exposes LLM API credentials
Same package: litellm CVE-2026-35030 9.1 LiteLLM: auth bypass via JWT cache key collision
Same package: litellm CVE-2026-40217 8.8 LiteLLM: RCE via bytecode rewriting in guardrails API
Same package: litellm CVE-2024-6825 8.8 LiteLLM: RCE via post_call_rules callback injection
Same package: litellm CVE-2026-42271 8.8 LiteLLM: RCE via MCP test endpoint command injection
Same package: litellm
AI Threat Alert