#VU125067 Improper access control in LiteLLM
Published: April 7, 2026
LiteLLM
LiteLLM
Description
The vulnerability allows a remote user to disclose password hashes and authenticate as another user.
The vulnerability exists due to improper access control in the /user/info, /user/update, /spend/users, and /v2/login endpoints when handling authenticated API requests and login attempts. A remote user can retrieve another user's password hash and submit the raw hash to log in as that user to disclose password hashes and authenticate as another user.
The issue can be exploited in an authentication bypass chain using three HTTP requests.