CVE-2026-30623: LiteLLM Authenticated MCP RCE
Root Cause Analysis
Section titled “Root Cause Analysis”Analysis indicates that the vulnerability originates from insecure processing of MCP configurations. The application fails to sanitize inputs provided in JSON format, allowing command injection.
Exploit Analysis
Section titled “Exploit Analysis”The attack vector leverages the MCP adapter configuration logic. By injecting a malicious JSON configuration containing arbitrary command and argument values, the LiteLLM process executes these inputs on the host system.
Detection Rules
Section titled “Detection Rules”title: LiteLLM Authenticated MCP RCE Detectionlogsource: category: process_creationdetection: selection: CommandLine: '*mcp*register*' condition: selection