CVE-2026-47102 PUBLISHED

LiteLLM < 1.83.10 Privilege Escalation via User Update

Assigner: VulnCheck
Reserved: 18.05.2026 Published: 21.05.2026 Updated: 22.05.2026

LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /user/update endpoint. While the endpoint correctly restricts users to updating only their own account, it does not restrict which fields may be changed. A user who can reach this endpoint can set their role to proxy_admin, gaining full administrative access to LiteLLM including all users, teams, keys, models, and prompt history. Users with the org_admin role have legitimate access to this endpoint and can exploit this vulnerability without chaining any additional flaw.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor BerriAI
Product litellm
Versions Default: affected
  • affected from 0 to 1.83.10 (excl.)

Credits

  • Fenix Qiao (aka 13ph03nix) from Obsidian Security finder

References

Problem Types

  • Incorrect Authorization CWE