VYPR
kevPublished Apr 29, 2026· Updated May 18, 2026· 1 source

Critical LiteLLM SQL Injection CVE-2026-42208 Exploited Within 36 Hours of Disclosure

A critical SQL injection vulnerability in BerriAI's LiteLLM Python package, CVE-2026-42208, is being actively exploited in the wild just 36 hours after disclosure, with attackers targeting database tables holding LLM provider keys and proxy credentials.

A critical SQL injection vulnerability in BerriAI's LiteLLM Python package, tracked as CVE-2026-42208 (CVSS 9.3), has come under active exploitation within 36 hours of public disclosure. The flaw, which affects LiteLLM versions >=1.81.16 and <1.83.7, allows an unauthenticated attacker to send a specially crafted Authorization header to any LLM API route (e.g., POST /chat/completions) and reach the proxy database through the error-handling path. This enables reading and potentially modifying sensitive data stored in the proxy database.

The vulnerability stems from a database query used during proxy API key checks that mixed the caller-supplied key value directly into the query text instead of passing it as a separate parameter. According to Sysdig, the first exploitation attempt was recorded on April 26 at 16:17 UTC, roughly 26 hours after the GitHub advisory was indexed in the global GitHub Advisory Database. The SQL injection activity originated from IP address 65.111.27[.]132.

Security researcher Michael Clark noted that malicious activity fell into two phases driven by the same operator across two adjacent egress IPs, followed by a brief unauthenticated probe of key-management endpoints. The unknown threat actor specifically targeted database tables like "litellm_credentials.credential_values" and "litellm_config," which hold information related to upstream LLM provider keys and the proxy runtime environment. No probes were observed against tables like "litellm_users" or "litellm_team," indicating the attacker was aware of the database schema and focused on high-value secrets.

In the second phase of the attack, observed after 20 minutes, the threat actor used a different IP address (65.111.25[.]67) to abuse the access and run a similar probe. Sysdig warned that a single litellm_credentials row often holds an OpenAI organization key with five-figure monthly spend caps, an Anthropic console key with workspace admin rights, and an AWS Bedrock IAM credential. The blast radius of a successful database extraction is closer to a cloud-account compromise than a typical web-app SQL injection.

LiteLLM is a popular open-source AI Gateway software with over 45,000 stars and 7,600 forks on GitHub. Last month, the project was the target of a supply chain attack orchestrated by the TeamPCP hacking group to steal credentials and secrets from downstream users. The rapid exploitation of CVE-2026-42208 continues the modal pattern for AI-infrastructure advisories: critical, pre-auth, and in software with five-figure star counts that operators trust to centralize cloud-grade credentials.

The vulnerability was addressed in version 1.83.7-stable released on April 19, 2026. Users are advised to patch their instances to the latest version immediately. If patching is not an immediate option, the maintainers recommend setting "disable_error_logs: true" under "general_settings" to remove the path through which untrusted input reaches the vulnerable query. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-42208 to its Known Exploited Vulnerabilities (KEV) catalog on May 8, 2026, requiring Federal Civilian Executive Branch (FCEB) agencies to apply patches by May 11, 2026.

The 36-hour exploit window is consistent with the broader collapse documented by the Zero Day Clock, and the operator behavior recorded (verbatim Prisma table names, three-table targeting, deliberate column-count enumeration) shows that exploitation no longer waits for a public PoC. The advisory and the open-source schema were ultimately enough for attackers to weaponize the flaw. This incident underscores the urgent need for organizations to prioritize patching of AI infrastructure components that centralize sensitive credentials.

Synthesized by Vypr AI