<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>BerriAI — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/berriai/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 02:01:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/berriai/feed.xml" rel="self" type="application/rss+xml"/><item><title>LiteLLM Authenticated Command Injection via MCP stdio Test Endpoints (CVE-2026-42271)</title><link>https://feed.craftedsignal.io/briefs/2026-05-litellm-cmd-injection/</link><pubDate>Wed, 20 May 2026 02:01:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-litellm-cmd-injection/</guid><description>A command injection vulnerability exists in LiteLLM versions 1.74.2 to &lt; 1.83.7, allowing authenticated users with a valid API key to execute arbitrary OS commands as root via the MCP stdio transport through the `POST /mcp-rest/test/connection` and `POST /mcp-rest/test/tools/list` endpoints, especially in default Docker deployments, and a public exploit is available.</description><content:encoded><![CDATA[<p>A command injection vulnerability, tracked as CVE-2026-42271, affects LiteLLM versions 1.74.2 up to, but not including, 1.83.7. The vulnerability resides in the MCP (Message Connector Protocol) stdio transport and can be exploited through the <code>/mcp-rest/test/connection</code> and <code>/mcp-rest/test/tools/list</code> endpoints. An attacker with a valid API key can leverage this flaw to execute arbitrary operating system commands with root privileges within the Docker container, which is the default deployment. The availability of a public exploit on Sploitus significantly increases the risk to unpatched LiteLLM instances. A proof-of-concept exploit, along with mitigation steps, is documented in the advisory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains a valid LiteLLM API key.</li>
<li>The attacker sends a POST request to <code>/mcp-rest/test/connection</code> or <code>/mcp-rest/test/tools/list</code>.</li>
<li>The request body specifies <code>&quot;transport&quot;: &quot;stdio&quot;</code> to enable the vulnerable transport.</li>
<li>The request body includes a <code>&quot;command&quot;</code> field, set to a common shell executable such as <code>bash</code>.</li>
<li>The request body includes an <code>&quot;args&quot;</code> array containing shell arguments crafted to execute arbitrary commands (e.g., <code>&quot;-c&quot;, &quot;id &gt; /tmp/pwned&quot;</code>).</li>
<li>The LiteLLM server spawns a subprocess using the provided command and arguments.</li>
<li>The attacker-controlled command executes with root privileges inside the Docker container.</li>
<li>The attacker achieves arbitrary command execution, potentially leading to data exfiltration, reverse shell establishment, or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability allows an attacker to execute arbitrary commands with root privileges on the affected LiteLLM instance. In a default Docker deployment, this provides complete control over the container, leading to potential data exfiltration, deployment of malware, or further lateral movement within the network. The vulnerability impacts any LiteLLM instances running versions between 1.74.2 and 1.83.6 that have not applied the necessary patches or mitigations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LiteLLM to version 1.83.7 or later to apply the command whitelist and role-based access control fixes (CVE-2026-42271).</li>
<li>Implement a reverse proxy rule to block access to the <code>/mcp-rest/test/connection</code> and <code>/mcp-rest/test/tools/list</code> endpoints.</li>
<li>Rotate API keys and restrict their privileges to minimize the impact of potential key compromise.</li>
<li>Deploy LiteLLM in a Docker container with a non-root user context (<code>docker run --user 1000:1000 ...</code>).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts targeting these endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command injection</category><category>rce</category><category>litellm</category><category>CVE-2026-42271</category></item></channel></rss>