← Back to feed

CVE-2026-42208 LiteLLM SQL Injection Actively Exploited: Attackers Target Credential Storage Within 26 Hours of Disclosure

Date: 2026-05-05
Tags: supply-chain

Executive Summary

CVE-2026-42208 (CVSS score: 9.3) is an SQL injection in LiteLLM proxy database during API key verification; the database query mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. While the vulnerability was addressed in version 1.83.7-stable released on April 19, 2026, the first exploitation attempt was recorded on April 26 at 16:17 UTC, roughly 26 hours and seven minutes after the GitHub advisory was indexed in the global GitHub Advisory Database. The attacker targeted database tables like 'litellm_credentials.credential_values' and 'litellm_config' that hold information related to upstream large language model provider keys; the attacker was not only aware of these tables, but also went after those that hold sensitive secrets.

Campaign Summary

FieldDetail
Campaign / MalwareLiteLLM Pre-Auth SQL Injection Exploitation
AttributionUnknown threat actor (confidence: low)
TargetOrganizations running unpatched LiteLLM proxy versions; AI infrastructure operators leveraging LiteLLM for multi-model gateway services
VectorHTTP Authorization header injection; pre-authentication SQL injection via LLM API routes
Statusactive
First Observed2026-04-26

Detailed Findings

An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example, POST /chat/completions) and reach this query through the proxy's error-handling path; an attacker could read data from the proxy's database and may be able to modify it, leading to unauthorized access to the proxy and the credentials it manages. In the second phase of the attack, observed after 20 minutes, the threat actor used a different IP address, this time abusing the access to run a similar probe. LiteLLM is a popular, open-source AI Gateway software with over 45,000 stars and 7,600 forks on GitHub; last month, the project was the target of a supply chain attack orchestrated by the TeamPCP hacking group to steal credentials and secrets from downstream users.

MITRE ATT&CK Mapping

TechniqueIDContext
SQL InjectionT1190Attacker injects malicious SQL via Authorization header into LiteLLM proxy database queries to read/modify credential storage
Credential AccessT1110Exploitation targets litellm_credentials.credential_values table to exfiltrate upstream LLM provider API keys and cloud credentials

IOCs

Domains

_Vulnerable versions: < 1.83.7-stable; patched in 1.83.7-stable (released 2026-04-19); exploitation IPs observed include 65.111.25.67_

Full URL Paths

_Vulnerable versions: < 1.83.7-stable; patched in 1.83.7-stable (released 2026-04-19); exploitation IPs observed include 65.111.25.67_

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

litellm

Detection Recommendations

Monitor for unusual Authorization header patterns in LiteLLM proxy access logs; detect SQL syntax characters (single quotes, semicolons, UNION) in Authorization headers; log and alert on database errors returned in proxy error-handling paths; implement WAF rules to block SQL injection patterns in HTTP headers; audit litellm_credentials.credential_values table for unauthorized read/write activity and export events; ensure all LiteLLM deployments are updated to version 1.83.7-stable or later; monitor for credential exfiltration from proxy database to external IPs.

References