{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "21156ff5d0d84a7dd93f951ca033275c77e4f73c"
            }
          ],
          "repo": "https://github.com/berriai/litellm",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "A vulnerability in BerriAI/litellm, as of commit 26c03c9, allows unauthenticated users to cause a Denial of Service (DoS) by exploiting the use of ast.literal_eval to parse user input. This function is not safe and is prone to DoS attacks, which can crash the litellm Python server.",
  "id": "CVE-2024-10188",
  "modified": "2026-03-13T21:49:35.156655874Z",
  "published": "2025-03-20T10:15:14.993Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://huntr.com/bounties/96a32812-213c-4819-ba4e-36143d35e95b"
    },
    {
      "type": "FIX",
      "url": "https://github.com/berriai/litellm/commit/21156ff5d0d84a7dd93f951ca033275c77e4f73c"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}