LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
The Hacker NewsArchived Apr 29, 2026✓ Full text saved
In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge. The vulnerability, tracked as CVE-2026-42208 (CVSS score: 9.3), is an SQL injection that could be exploited to modify the underlying
Full text archived locally
✦ AI Summary· Claude Sonnet
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
Ravie LakshmananApr 29, 2026Vulnerability / Cloud Security
In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge.
The vulnerability, tracked as CVE-2026-42208 (CVSS score: 9.3), is an SQL injection that could be exploited to modify the underlying LiteLLM proxy database.
"A database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter," LiteLLM maintainers said in an alert last week.
"An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example, POST /chat/completions) and reach this query through the proxy's error-handling path. An attacker could read data from the proxy's database and may be able to modify it, leading to unauthorized access to the proxy and the credentials it manages."
The shortcoming affects the following versions -
>=1.81.16
<1.83.7
While the vulnerability was addressed in version 1.83.7-stable released on April 19, 2026, the first exploitation attempt was recorded on April 26 at 16:17 UTC, roughly 26 hours and seven minutes after the GitHub advisory was indexed in the global GitHub Advisory Database. The SQL injection activity, per Sysdig, originated from the IP address 65.111.27[.]132.
"Malicious activity fell into two phases driven by the same operator across two adjacent egress IPs, followed by a brief unauthenticated probe of the key-management endpoints," security researcher Michael Clark said.
Specifically, the unknown threat actor is said to have targeted database tables like "litellm_credentials.credential_values" and "litellm_config" that hold information related to upstream large language model (LLM) provider keys and the proxy runtime environment. No probes were observed against tables like "litellm_users" or "litellm_team."
This suggests that the attacker was not only aware of these tables, but also went after those that hold sensitive secrets. In the second phase of the attack, observed after 20 minutes, the threat actor used a different IP address ("65.111.25[.]67"), this time abusing the access to run a similar probe.
LiteLLM is a popular, open-source AI Gateway software with over 45,000 stars and 7,600 forks on GitHub. Last month, the project was the target of a supply chain attack orchestrated by the TeamPCP hacking group to steal credentials and secrets from downstream users.
"A single litellm_credentials row often holds an OpenAI organization key with five-figure monthly spend caps, an Anthropic console key with workspace admin rights, and an AWS Bedrock IAM credential," Sysdig said. "The blast radius of a successful database extraction is closer to a cloud-account compromise than a typical web-app SQL injection."
Users are advised to patch their instances to the latest version. If this is not an immediate option, the maintainers recommend setting "disable_error_logs: true" under "general_settings" to remove the path through which untrusted input reaches the vulnerable query.
"The LiteLLM vulnerability (GHSA-r75f-5x8p-qvmc) continues the modal pattern for AI-infrastructure advisories: critical, pre-auth, and in software with five-figure star counts that operators trust to centralize cloud-grade credentials," Sysdig added.
"The 36-hour exploit window is consistent with the broader collapse documented by the Zero Day Clock, and the operator behavior we recorded (verbatim Prisma table names, three-table targeting, deliberate column-count enumeration) shows that exploitation no longer waits for a public PoC. The advisory and the open-source schema were ultimately enough."
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
SHARE
Tweet
Share
Share
SHARE
AI Infrastructure, Cloud security, cybersecurity, data breach, GitHub, Open Source, sql injection, supply chain attack, Vulnerability
Trending News
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
Why Threat Intelligence Is the Missing Link in CTEM Prioritization and Validation
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users
Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials
The Hidden Security Risks of Shadow AI in Enterprises
Why Security Leaders Are Layering Email Defense on Top of Secure Email Gateways
OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released
Your MTTD Looks Great. Your Post-Alert Gap Doesn't
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads
Load More ▼
Popular Resources
Automate Alert Triage and Investigations Across Every Threat
How to Identify Risky Browser Extensions in Your Organization
Discover Key AI Security Gaps CISOs Face in 2026
Fix Rising Application Security Risks Driven by AI Development