<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>LiteLLM &lt; 1.83.10 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/litellm--1.83.10/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 21:18:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/litellm--1.83.10/feed.xml" rel="self" type="application/rss+xml"/><item><title>LiteLLM Privilege Escalation via /user/update Endpoint (CVE-2026-47102)</title><link>https://feed.craftedsignal.io/briefs/2026-05-litellm-privesc/</link><pubDate>Thu, 21 May 2026 21:18:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-litellm-privesc/</guid><description>CVE-2026-47102 describes a privilege escalation vulnerability in LiteLLM versions prior to 1.83.10, where the /user/update endpoint allows users to modify their own user_role, potentially escalating their privileges to proxy_admin.</description><content:encoded><![CDATA[<p>LiteLLM versions prior to 1.83.10 are vulnerable to a privilege escalation via the <code>/user/update</code> endpoint (CVE-2026-47102). The vulnerability stems from insufficient access controls on the fields that users can modify within their own account profile. While the endpoint correctly restricts users to only updating their own account, it fails to prevent modification of the <code>user_role</code> field. By exploiting this flaw, a standard user can elevate their privileges to <code>proxy_admin</code>, gaining unrestricted administrative control over LiteLLM, including all users, teams, keys, models, and prompt history. Users with the <code>org_admin</code> role can exploit this vulnerability without chaining any additional flaws, making internal threat actors a significant risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the LiteLLM application with standard user credentials.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/user/update</code> endpoint.</li>
<li>The HTTP request includes a modified <code>user_role</code> field set to <code>proxy_admin</code>.</li>
<li>The attacker sends the crafted HTTP request to the LiteLLM server.</li>
<li>The LiteLLM server, lacking proper input validation, accepts the modified <code>user_role</code> value.</li>
<li>The attacker&rsquo;s account is updated with the <code>proxy_admin</code> role in the LiteLLM database.</li>
<li>The attacker logs out and logs back in to refresh their permissions.</li>
<li>The attacker, now with <code>proxy_admin</code> privileges, can access and control all aspects of the LiteLLM platform.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain full administrative control over the LiteLLM platform. This includes the ability to manage all users, teams, API keys, models, and prompt history. The attacker could potentially exfiltrate sensitive data, modify models, create new administrative accounts, or disrupt the service for all users. The vulnerability poses a significant risk to the confidentiality, integrity, and availability of the LiteLLM platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to LiteLLM version 1.83.10 or later to patch CVE-2026-47102.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-47102 Exploitation — LiteLLM User Role Update&rdquo; to monitor for malicious attempts to modify the <code>user_role</code> field via the <code>/user/update</code> endpoint.</li>
<li>Review access logs for unusual activity related to the <code>/user/update</code> endpoint, specifically focusing on POST requests with modifications to user roles.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>CVE-2026-47102</category><category>web-application</category></item></channel></rss>