← Back to feed

CVE-2026-42208: Critical SQL Injection in LiteLLM AI Gateway Exploited Within 36 Hours—Attackers Harvest LLM Credentials and Configuration

Date: 2026-05-13
Tags: supply-chain, malicious-tool

Executive Summary

CVE-2026-42208 (CVSS score: 9.3) is an SQL injection that could be exploited to modify the underlying LiteLLM proxy database. While the vulnerability was addressed in version 1.83.7-stable released on April 19, 2026, the first exploitation attempt was recorded on April 26 at 16:17 UTC, roughly 26 hours and seven minutes after the GitHub advisory was indexed in the global GitHub Advisory Database. Attackers actively targeted credential tables, confirming the shift of AI infrastructure into the active exploitation window.

Campaign Summary

FieldDetail
Campaign / MalwareLiteLLM CVE-2026-42208 Active Exploitation Campaign
AttributionUnknown, likely organized crime or state-linked (confidence: low)
TargetOrganizations running LiteLLM proxy in production, particularly in financial services and healthcare
VectorSQL injection via Authorization header
Statusactive
First Observed2026-04-26

Detailed Findings

A database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example, POST /chat/completions) and reach this query through the proxy's error-handling path. An attacker could read data from the proxy's database and may be able to modify it, leading to unauthorized access to the proxy and the credentials it manages. The unknown threat actor is said to have targeted database tables like "litellm_credentials.credential_values" and "litellm_config" that hold information related to upstream large language model (LLM) provider keys and the proxy runtime environment. No probes were observed against tables like "litellm_users" or "litellm_team." This suggests that the attacker was not only aware of these schema, but also went after those that hold sensitive secrets. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on May 8, 2026, added CVE-2026-42208 to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the patches by May 11, 2026.

MITRE ATT&CK Mapping

TechniqueIDContext
SQL InjectionT1190Exploitation of unparameterized SQL queries in API key validation
Credential AccessT1555Extraction of LLM provider API keys from compromised database

IOCs

Domains

_IP source attribution from Sysdig telemetry. CVE-2026-42208 CVSS 9.3, patched in 1.83.7_

Full URL Paths

_IP source attribution from Sysdig telemetry. CVE-2026-42208 CVSS 9.3, patched in 1.83.7_

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

litellm versions 1.81.16 to 1.83.6 (vulnerable)

Detection Recommendations

Immediate: (1) Upgrade all LiteLLM instances to version 1.83.7 or later; (2) Review access logs for any Authorization headers containing SQL syntax (semicolons, quotes, UNION keywords) between April 19-26; (3) Rotate all upstream LLM provider API keys; (4) Audit CloudTrail / database logs for unauthorized SELECT/UPDATE on litellm_credentials and litellm_config tables. Ongoing: Implement WAF rules blocking SQL payloads in Authorization headers; segment LiteLLM instances behind authenticated reverse proxies; enable real-time query monitoring on database connections from LiteLLM processes.

References