A critical vulnerability, CVE-2026-35030, affects LiteLLM (an AI gateway/proxy for calling LLM APIs). Prior to version 1.83.0, when JWT authentication is enabled (enable_jwt_auth: true), the OIDC userinfo cache uses the first 20 characters of the token (token[:20]) as the cache key. JWT headers produced by the same signing algorithm can produce identical first 20 characters, allowing an unauthenticated attacker to craft a token whose first 20 characters match a legitimate user’s cached token. On a cache hit the attacker inherits the legitimate user’s identity and permissions. This configuration option is not enabled by default, so most instances are not affected; however deployments that do enable JWT/OIDC authentication are vulnerable. The issue is fixed in v1.83.0 and is assigned a CVSS 4.0 base score of 9.4 (CRITICAL) per the published advisory.
The IONIX research team is tracking ongoing exploitation attempts and recommends immediate patching. Potentially affected assets are outlined in this post.
References:

