CVE-2026-42271 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: May 8, 2026
LiteLLM - Command Injection
Published: May 8, 2026Updated: May 8, 2026Remote Exploitable
Overview
LiteLLM 1.74.2 to < 1.83.7 contains a command injection caused by unsanitized command, args, and env fields in stdio transport configuration in POST /mcp-rest/test/connection and /mcp-rest/test/tools/list endpoints, letting authenticated users execute arbitrary commands on the proxy host, exploit requires valid proxy API key.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Authenticated users can execute arbitrary commands on the proxy host, leading to full system compromise.
Mitigation
Upgrade to version 1.83.7 or later.
References
Related Resources
Details
- CVE ID
- CVE-2026-42271
- Severity
- High
- CVSS Score
- 8.8
- Type
- command_injection
- Status
- confirmed
CWE
- CWE-77
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H