litellm

← back

Binary Scan

Scored by Repobility's multi-pass pipeline · https://repobility.com
Version1.83.7
Binaries0
ROP Gadgets0
GOT Entries0
Unsafe Functions0
Full RELRO0/0
Canary0/0
FORTIFY0/0
GradeN
Compound Risk5510.8

Known CVEs (20)

Findings produced by Repobility · scan your repo at https://repobility.com/scan/
ID Severity CVSS Summary
Provenance: Repobility (https://repobility.com) — every score reproducible from /scan/
CVE-2024-5751 critical 9.8 litellm vulnerable to remote code execution based on using eval unsafely
GHSA-gppg-gqw8-wh9g critical 9.8
CVE-2024-2952 critical 9.8 LiteLLM has Server-Side Template Injection vulnerability in /completions endpoint
GHSA-46cm-pfwv-cgf8 critical 9.8
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
GHSA-jjhc-v7c2-5hh6 critical 9.4
CVE-2026-35030 critical 9.1 litellm: LiteLLM: Authentication bypass and privilege escalation via OIDC userinfo cache key collision
CVE-2026-35030 critical 9.1 litellm: LiteLLM: Authentication bypass and privilege escalation via OIDC userinfo cache key collision

Composition Findings (0)

Open methodology · Repobility · https://repobility.com/research/
Type Severity Risk Title
Repobility · code-quality intelligence · https://repobility.com
No composition findings