LiteLLM CVE-2026-42208: Critical SQL Injection in Proxy Database Enables Unauthorized Credential Access
Date: 2026-04-29
Tags: malicious-tool
Executive Summary
CVE-2026-42208 (CVSS score: 9.3) is an SQL injection vulnerability in LiteLLM that could be exploited to modify the underlying LiteLLM proxy database. The first exploitation attempt was recorded on April 26 at 16:17 UTC, roughly 26 hours and seven minutes after the GitHub advisory was indexed in the global GitHub Advisory Database. The unknown threat actor targeted database tables like "litellm_credentials.credential_values" and "litellm_config" that hold information related to upstream large language model (LLM) provider keys and the proxy runtime environment, demonstrating that the attacker was not only aware of these tables, but also went after those that hold sensitive secrets.
Campaign Summary
| Field | Detail |
|---|---|
| Campaign / Malware | LiteLLM Proxy Database Exploitation |
| Attribution | Unknown Threat Actor (confidence: medium) |
| Target | Organizations running LiteLLM proxy infrastructure for LLM routing and credential management |
| Vector | Unauthenticated SQL injection via crafted Authorization header in LLM API routes |
| Status | active |
| First Observed | 2026-04-26 |
Detailed Findings
A database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter, allowing an unauthenticated attacker to send a specially crafted Authorization header to any LLM API route (for example, POST /chat/completions) and reach this query through the proxy's error-handling path, enabling them to read data from the proxy's database and may be able to modify it, leading to unauthorized access to the proxy and the credentials it manages.
LiteLLM is a popular, open-source AI Gateway software with over 45,000 stars and 7,600 forks on GitHub, and the project was the target of a supply chain attack orchestrated by the TeamPCP hacking group in March 2026. CVE-2026-42208 continues the modal pattern for AI-infrastructure advisories: critical, pre-auth, and in software with five-figure star counts that operators trust to centralize cloud-grade credentials.
The 36-hour exploit window is consistent with the broader collapse documented by the Zero Day Clock, and the operator behavior recorded (verbatim Prisma table names, three-table targeting, deliberate column-count enumeration) shows that exploitation no longer waits for a public PoC. The advisory and the open-source schema were ultimately enough.
MITRE ATT&CK Mapping
| Technique | ID | Context |
|---|---|---|
| SQL Injection | T1190 | Exploitation of unauthenticated SQL injection via public-facing API endpoint |
| Credential Access | T1555 | Extraction of LLM provider API keys and cloud credentials from proxy database |
| Data from Information Repositories | T1213 | Targeted queries against specific credential and configuration tables |
IOCs
Domains
_IP address used in second phase of exploitation per Hacker News report. No CVE-specific IOCs published._
Full URL Paths
_IP address used in second phase of exploitation per Hacker News report. No CVE-specific IOCs published._
Splunk Format
_No IOCs available for Splunk query_
Package Indicators
litellm
Detection Recommendations
Monitor LiteLLM proxy logs for: (1) Authorization header parsing errors or SQL-related error responses in API logs; (2) Unusual query patterns against litellm_credentials.credential_values and litellm_config tables; (3) SELECT COUNT(*) queries or column-enumeration patterns from unauthenticated access; (4) Requests from unusual IP ranges probing standard LiteLLM table names. Implement parameterized queries and prepared statements for all database operations. Deploy rate limiting on API authentication paths to limit error-based SQL enumeration attempts.
References
- [The Hacker News] LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure (2026-04-27) — https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html
- [Sysdig Threat Research Team] LiteLLM SQL Injection: Exploitation Patterns and Defense (2026-04-27) — https://webflow.sysdig.com/blog/litellm-cve-2026-42208