Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Fresh LiteLLM Vulnerability Exploited Shortly After Disclosure

0
Low
Exploit
Published: Wed Apr 29 2026 (04/29/2026, 13:04:05 UTC)
Source: SecurityWeek

Description

A critical SQL injection vulnerability (CVE-2026-42208) in the LiteLLM proxy allows unauthenticated attackers to read and potentially modify the proxy's database by exploiting a flaw in the API key verification process. The vulnerability was exploited shortly after public disclosure to access sensitive data such as API keys and credentials. The issue arises because user-supplied input is improperly included in a database query without parameterization, enabling injection before authentication. LiteLLM version 1. 83. 7 addresses this by properly parameterizing the query. No confirmed abuse of extracted credentials has been observed, but users are urged to update or disable error logs to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/29/2026, 13:06:31 UTC

Technical Analysis

The LiteLLM proxy contains an SQL injection vulnerability in its API key verification process, identified as CVE-2026-42208 with a CVSS score of 9.3. The flaw occurs because the database query includes caller-supplied values directly rather than as separate parameters, allowing unauthenticated attackers to send crafted Authorization headers to any LLM API route. Exploitation enables attackers to read and potentially modify database tables containing sensitive information such as API keys, provider credentials, and environment configurations. Attacks were observed soon after disclosure, targeting specific database tables with automated tools. The vulnerability is fixed in LiteLLM version 1.83.7 by ensuring proper parameterization of database queries.

Potential Impact

Exploitation of this vulnerability allows unauthenticated attackers to access and potentially modify sensitive data stored in the LiteLLM proxy's database, including API keys and credentials. This could lead to credential leakage and unauthorized access if exploited. Although attacks were observed shortly after disclosure, no confirmed misuse of extracted credentials has been reported. The vulnerability has a high severity rating (CVSS 9.3), indicating significant risk if left unpatched.

Mitigation Recommendations

LiteLLM version 1.83.7 provides an official fix by properly parameterizing database queries to prevent SQL injection. Users should update to this patched version as soon as possible. Alternatively, disabling error logs can mitigate the exploitation path temporarily. Since this is not a cloud service, remediation depends on user action. Patch status is confirmed by the vendor advisory. No additional mitigation steps are indicated by the vendor.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/fresh-litellm-vulnerability-exploited-shortly-after-disclosure/","fetched":true,"fetchedAt":"2026-04-29T13:06:21.718Z","wordCount":997}

Threat ID: 69f2024dcbff5d8610101209

Added to database: 4/29/2026, 1:06:21 PM

Last enriched: 4/29/2026, 1:06:31 PM

Last updated: 4/30/2026, 3:49:21 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses