CVE-2026-47101: LiteLLM: RBAC bypass enables proxy admin escalation
HIGHLiteLLM's API key generation endpoint fails to validate that requested route permissions fall within the requesting user's own role scope, allowing any authenticated internal_user to craft a key granting access to admin-only proxy routes. With a CVSS 8.8 score, low attack complexity, and no user interaction required, exploitation is trivial for any user with even basic platform access — think contractors, developers, or compromised service accounts with internal_user role. Although no public exploit exists and this is not in CISA KEV, the blast radius is severe: a compromised LiteLLM proxy admin can rotate or exfiltrate all downstream LLM provider API credentials (OpenAI, Anthropic, Azure OpenAI), manipulate model routing, and intercept all inference traffic across the organization's AI stack. Upgrade to LiteLLM v1.83.14-stable immediately and audit all existing API keys for anomalous allowed_routes grants.
What is the risk?
High-risk due to CVSS 8.8 combined with minimal exploitation requirements: network-accessible, low privilege, no user interaction. Any authenticated internal_user — including those with read-only access, compromised accounts, or insider threats — can escalate to full proxy_admin. LiteLLM is deployed as a centralized AI gateway in enterprise environments, making it a high-value lateral movement pivot: admin access exposes all connected LLM provider API keys, routing configurations, spend data, and organizational model usage patterns. No public exploit exists at time of writing, but the attack pattern is straightforward enough that weaponization is likely within days of public disclosure given a huntr.com bounty report is publicly linked.
Attack Kill Chain
What systems are affected?
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| litellm | pip | — | No patch |
Do you use litellm? You're affected.
Severity & Risk
Attack Surface
What should I do?
6 steps-
Patch immediately: upgrade to LiteLLM v1.83.14-stable or later (fix commits: 2220f30, 5190bd0, d910a95).
-
Audit all existing API keys: review allowed_routes fields for any internal_user-created keys that include admin-tier routes (/user/new, /user/info, /model/new, /team/new, /global/spend/logs, etc.) — revoke any suspicious keys immediately.
-
Rotate all LiteLLM master keys and downstream LLM provider API credentials if exploitation cannot be ruled out prior to patching.
-
If immediate patching is not feasible, restrict the /key/generate endpoint to proxy_admin role only at the network or application layer as a temporary workaround.
-
Enable and review audit logs for key creation events from non-admin users, particularly those specifying allowed_routes with admin-tier paths.
-
Implement periodic access reviews of all API key grants as a compensating control going forward.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-47101?
LiteLLM's API key generation endpoint fails to validate that requested route permissions fall within the requesting user's own role scope, allowing any authenticated internal_user to craft a key granting access to admin-only proxy routes. With a CVSS 8.8 score, low attack complexity, and no user interaction required, exploitation is trivial for any user with even basic platform access — think contractors, developers, or compromised service accounts with internal_user role. Although no public exploit exists and this is not in CISA KEV, the blast radius is severe: a compromised LiteLLM proxy admin can rotate or exfiltrate all downstream LLM provider API credentials (OpenAI, Anthropic, Azure OpenAI), manipulate model routing, and intercept all inference traffic across the organization's AI stack. Upgrade to LiteLLM v1.83.14-stable immediately and audit all existing API keys for anomalous allowed_routes grants.
Is CVE-2026-47101 actively exploited?
No confirmed active exploitation of CVE-2026-47101 has been reported, but organizations should still patch proactively.
How to fix CVE-2026-47101?
1. Patch immediately: upgrade to LiteLLM v1.83.14-stable or later (fix commits: 2220f30, 5190bd0, d910a95). 2. Audit all existing API keys: review allowed_routes fields for any internal_user-created keys that include admin-tier routes (/user/new, /user/info, /model/new, /team/new, /global/spend/logs, etc.) — revoke any suspicious keys immediately. 3. Rotate all LiteLLM master keys and downstream LLM provider API credentials if exploitation cannot be ruled out prior to patching. 4. If immediate patching is not feasible, restrict the /key/generate endpoint to proxy_admin role only at the network or application layer as a temporary workaround. 5. Enable and review audit logs for key creation events from non-admin users, particularly those specifying allowed_routes with admin-tier paths. 6. Implement periodic access reviews of all API key grants as a compensating control going forward.
What systems are affected by CVE-2026-47101?
This vulnerability affects the following AI/ML architecture patterns: LLM proxy and gateway deployments, multi-provider AI API routing infrastructure, enterprise AI API management platforms, agentic AI pipelines using LiteLLM as model router, model serving.
What is the CVSS score for CVE-2026-47101?
CVE-2026-47101 has a CVSS v3.1 base score of 8.8 (HIGH).
Technical Details
NVD Description
LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API keys with access to routes that their role does not permit. When generating a key, the allowed_routes field is stored without verifying that the specified routes fall within the user's own permissions. A key created with access to admin-only routes can then be used to reach those routes successfully, bypassing the role-based access controls that would otherwise block the request, enabling full privilege escalation from internal_user to proxy_admin.
Exploitation Scenario
An attacker with internal_user credentials — obtained via phishing, credential stuffing, or a compromised developer account — sends a POST to the LiteLLM /key/generate endpoint embedding admin-only routes such as ['/user/new', '/model/new', '/team/new', '/global/spend/logs'] in the allowed_routes field. Because LiteLLM stores this field without validating it against the requestor's own permission scope (CWE-863), the request succeeds and returns a valid API key with proxy_admin-level route access. The attacker then uses this elevated key to call /user/new to create a backdoor admin account for persistence, /model/new to add a malicious model configuration pointing to an adversary-controlled endpoint, and /global/spend/logs to harvest all LLM provider API credentials in use. In an agentic deployment, the attacker silently reroutes agent model calls to intercept prompt content and tool invocations across the entire AI pipeline.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References
- gist.github.com/13ph03nix/9ec616e1fdc77b3673509c60206e827f
- github.com/BerriAI/litellm/commit/2220f3076ac89bd2a2e3439acf57dcfbec2434c9
- github.com/BerriAI/litellm/commit/5190bd07eb23a037745d86328096f54378f1614a
- github.com/BerriAI/litellm/commit/d910a95661fce3cdd36f3b06c03ecf9c46c6457c
- github.com/BerriAI/litellm/releases/tag/v1.83.14-stable
- huntr.com/bounties/8e75edfb-ff05-4e63-bfca-2d93d03fb3b9
- vulncheck.com/advisories/litellm-privilege-escalation-via-api-key-generation
Timeline
Related Vulnerabilities
CVE-2026-42208 9.8 LiteLLM: SQL injection exposes LLM API credentials
Same package: litellm CVE-2026-35030 9.1 LiteLLM: auth bypass via JWT cache key collision
Same package: litellm CVE-2024-6825 8.8 LiteLLM: RCE via post_call_rules callback injection
Same package: litellm CVE-2026-40217 8.8 LiteLLM: RCE via bytecode rewriting in guardrails API
Same package: litellm CVE-2026-42203 8.8 LiteLLM: SSTI in prompt template endpoint enables RCE
Same package: litellm