-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| litellm | pip | < 1.34.42 | 1.34.42 |
The vulnerability stems from the hf_chat_template function using Jinja's default Environment() to render user-controlled templates. The commit diff shows the fix replaced Environment() with ImmutableSandboxedEnvironment, which confirms the original implementation lacked proper sandboxing. This allowed attackers to inject template code that executes arbitrary Python commands through specially crafted tokenizer_config.json files. The function's direct handling of external template input without safe rendering mechanisms makes it clearly vulnerable.
Ongoing coverage of React2Shell