MAL-2026-2144

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/litellm/MAL-2026-2144.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-2144
Aliases
Published
2026-03-24T22:11:32Z
Modified
2026-03-24T22:39:02.762580Z
Summary
Malicious code in litellm (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: google-open-source-security (6a89401cbf53902e8374fbf3b424a77bb5e5f8c437176232eab7c3237d10ecbe)

LiteLLM was compromised through trivy security scan in a GitHub workflow. Attackers uploaded malicious versions of LiteLLM to PyPI. The malicious code would exfiltrate sensitive secrets to an attcker controlled domain.

Database specific
{
    "iocs": {
        "domains": [
            "litellm.cloud"
        ],
        "urls": [
            "https://models.litellm.cloud/"
        ]
    },
    "malicious-packages-origins": [
        {
            "versions": [
                "1.82.7",
                "1.82.8"
            ],
            "sha256": "6a89401cbf53902e8374fbf3b424a77bb5e5f8c437176232eab7c3237d10ecbe",
            "import_time": "2026-03-24T22:11:35.145201Z",
            "modified_time": "2026-03-24T22:11:32Z",
            "source": "google-open-source-security"
        }
    ]
}
References

Affected packages

PyPI / litellm

Package

Affected ranges

Affected versions

1.*
1.82.7
1.82.8

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/litellm/MAL-2026-2144.json"