LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-42271

CVE-2026-42271 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: May 8, 2026

LiteLLM - Command Injection

Published: May 8, 2026Updated: May 8, 2026Remote Exploitable

Overview

LiteLLM 1.74.2 to < 1.83.7 contains a command injection caused by unsanitized command, args, and env fields in stdio transport configuration in POST /mcp-rest/test/connection and /mcp-rest/test/tools/list endpoints, letting authenticated users execute arbitrary commands on the proxy host, exploit requires valid proxy API key.

Severity & Score

Severity: High
CVSS Score: 8.8

Impact

Authenticated users can execute arbitrary commands on the proxy host, leading to full system compromise.

Mitigation

Upgrade to version 1.83.7 or later.

Details

CVE ID
CVE-2026-42271
Severity
High
CVSS Score
8.8
Type
command_injection
Status
confirmed

CWE

  • CWE-77

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H