<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>LiteLLM (&lt; 1.81.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/litellm--1.81.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 04:01:42 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/litellm--1.81.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>LiteLLM SQL Injection Vulnerability (CVE-2025-45809)</title><link>https://feed.craftedsignal.io/briefs/2026-05-litellm-sqli/</link><pubDate>Tue, 19 May 2026 04:01:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-litellm-sqli/</guid><description>A SQL Injection vulnerability (CVE-2025-45809) in LiteLLM versions prior to 1.81.0 allows unauthenticated attackers to potentially steal database contents and read server files via time-based blind SQL injection in the `/key/block` and `/key/unblock` endpoints.</description><content:encoded><![CDATA[<p>A SQL Injection vulnerability, tracked as CVE-2025-45809, affects LiteLLM versions prior to 1.81.0. The vulnerability resides in the <code>/key/block</code> and <code>/key/unblock</code> endpoints. A public exploit is available, demonstrating that an attacker can leverage time-based blind SQL injection via the <code>key</code> parameter to extract sensitive database information and potentially read files from the server. Successful exploitation could lead to data exfiltration and unauthorized access to internal systems. It is crucial for organizations using vulnerable versions of LiteLLM to upgrade to version 1.81.0 or later, or apply the suggested mitigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable LiteLLM instance running a version prior to 1.81.0.</li>
<li>The attacker crafts a malicious HTTP request targeting either the <code>/key/block</code> or <code>/key/unblock</code> endpoint.</li>
<li>The crafted request includes a SQL injection payload within the <code>key</code> parameter, designed for time-based blind injection.</li>
<li>The LiteLLM application processes the request without proper sanitization, executing the injected SQL code against the underlying database.</li>
<li>The attacker monitors the response time of the server. The time delay is used to infer the results of the SQL query due to the blind nature of the injection.</li>
<li>Through repeated requests and refined payloads, the attacker progressively extracts database contents, such as usernames, passwords, and API keys.</li>
<li>The attacker uses extracted credentials to gain unauthorized access to other services or resources.</li>
<li>The attacker may read files from the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2025-45809) could allow an unauthenticated attacker to steal sensitive database contents, including API keys and user credentials. While the CVSS score is rated as medium (5.4), the impact can be high if the compromised data grants access to critical systems or exposes sensitive customer information. Organizations using affected versions of LiteLLM are urged to apply the necessary patches or mitigations to prevent potential data breaches and unauthorized access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LiteLLM to version 1.81.0 or later to remediate CVE-2025-45809.</li>
<li>Implement input validation on the <code>key</code> parameter in the <code>/key/block</code> and <code>/key/unblock</code> endpoints.</li>
<li>Deploy a Web Application Firewall (WAF) to filter out requests containing SQL injection patterns, as recommended in the advisory.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/key/block</code> and <code>/key/unblock</code> endpoints to detect potential exploitation attempts (see webserver log source in the rules below).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>sqli</category><category>sql-injection</category><category>CVE-2025-45809</category></item></channel></rss>