Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-40217

Опубликовано: 10 апр. 2026
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A flaw was found in LiteLLM. A remote attacker can exploit this flaw by performing bytecode rewriting at the /guardrails/test_custom_code URI. This could lead to arbitrary code execution, allowing the attacker to run malicious code on the affected system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Lightspeed Coreredhat-user-workloads/lightspeed-stackAffected
Red Hat Ansible Automation Platform 2redhat-user-workloads/lightspeed-chatbot-rhel9Affected
Red Hat OpenShift AI (RHOAI)redhat-user-workloads/llama-stack-cpuAffected
Red Hat OpenShift AI (RHOAI)rhoai/odh-llama-stack-core-rhel9Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-mlflow-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2457301LiteLLM: LiteLLM: Arbitrary Code Execution via bytecode rewriting

EPSS

Процентиль: 41%
0.00188
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
5 дней назад

LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI.

CVSS3: 8.8
github
5 дней назад

LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI.

EPSS

Процентиль: 41%
0.00188
Низкий

8.8 High

CVSS3