CrowdSec
10/10CrowdSec Score

LiteLLM - SSRF (CVE-2024-6587)

Published on13-09-2024
First seen on23-11-2024

148Exploiting IPs reported

A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the request to the domain specified by `api_base`. This request includes the OpenAI API key. A malicious user can set the `api_base` to their own domain and intercept the OpenAI API key, leading to unauthorized access and potential misuse of the API key.

CrowdSec analysis

CVE-2024-6587 is a Server-Side Request Forgery (SSRF) vulnerability in the berriai/litellm library, allowing attackers to influence request destinations and potentially intercept sensitive API keys through crafted payloads.

CrowdSec has been tracking this vulnerability and its exploits since 10th of March 2025.

Data from the CrowdSec community indicates that exploitation of CVE-2024-6587 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2024-6587 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2024-6587 is currently experiencing high visibility and active exploitation across the internet.

Observed exploitation attempts are characterized by requests made to URLs containing /chat/completions.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Common Weakness Enumeration (CWE)

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.