Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <acPxcn816qOzTzPk@netmeister.org>
Date: Wed, 25 Mar 2026 10:30:35 -0400
From: Jan Schaumann <jschauma@...meister.org>
To: oss-security@...ts.openwall.com
Subject: backdoor in litellm version 1.82.7

The python package 'litellm' was compromised
(apparently via the earlier trivy compromise) and a
malicious version included code to steal credentials
and install a backdoor.

https://github.com/BerriAI/litellm/issues/24512
https://github.com/advisories/GHSA-5mg7-485q-xm76

https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/

Full PYSEC-2026-2 advisory below:

https://osv.dev/vulnerability/PYSEC-2026-2

---
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/litellm/PYSEC-2026-2.yaml

JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2026-2

Aliases
* MAL-2026-2144

Published
2026-03-24T16:15:08.809028Z

Modified
2026-03-24T22:41:32.746566Z

Summary
Two litellm versions published containing credential harvesting
malware

Details

After an API Token exposure from an exploited Trivy dependency,
two new releases of litellm were uploaded to PyPI containing
automatically activated malware, harvesting sensitive credentials
and files, and exfiltrating to a remote API.

The malicious code runs during importing any module from the
package and scans the file system and environment variables,
collecting all kinds of sensitive data, including but not limited
to private SSH keys, credentials to Git and Docker repositories,
dotenv files, tokens to Kubernetes service accounts, databases and
LDAP configuration. Also exfiltrated are multiple shell history
files and cryptowallet keys. The malware actively attempts to
obtain cloud access tokens from metadata servers and retrieve
secrets stored in AWS Secrets Manager. All collected data are sent
to the domain models.litellm[.]cloud

Furthermore, the code includes a persistence mechanism by
configuring a SystemD service unit masqueraded as "System
Telemetry Service" on the host it runs on, and in a Kubernetes
environment also by creating a new pod. The persistence script
then contacts hxxps://checkmarx[.]zone/raw for further
instructions.

Anyone who has installed and run the project should assume any
credentials available to litellm environment may have been
exposed, and revoke/rotate them accordingly. The affected
environment should be isolated and carefully reviewed against any
unexpected modifications and network traffic.

References
* https://inspector.pypi.io/project/litellm/1.82.8/packages/f6/2c/731b614e6cee0bca1e010a36fd381fba69ee836fe3cb6753ba23ef2b9601/litellm-1.82.8.tar.gz/litellm-1.82.8/litellm_init.pth#line.1
* https://inspector.pypi.io/project/litellm/1.82.7/packages/79/5f/b6998d42c6ccd32d36e12661f2734602e72a576d52a51f4245aef0b20b4d/litellm-1.82.7-py3-none-any.whl/litellm/proxy/proxy_server.py#line.130
* https://github.com/BerriAI/litellm/issues/24518
* https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/
* https://www.wiz.io/blog/teampcp-attack-kics-github-action

Credits
*    * Callum McMahon, Futuresearch - REPORTER
*    * Mike Fiedler - COORDINATOR
*    * Kamil MaƄkowski - ANALYST

Affected packages

PyPI / litellm

Package

Name
litellm
View open source insights on deps.dev

Purl
pkg:pypi/litellm

Affected ranges

Type
ECOSYSTEM

Events
Introduced
1.82.7
Last affected
1.82.8

Affected versions

1.*
1.82.7
1.82.8

Database specific

source

"https://github.com/pypa/advisory-database/blob/main/vulns/litellm/PYSEC-2026-2.yaml"

PYSEC-2026-2 - OSV

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.