Warning: LiteLLM pre-auth SQL injection (CVE-2026-42208), Patch Immediately!

Image
Decorative image
Veröffentlicht : 29/04/2026
  • Last update:  29/04/2026
  • Affected software: LiteLLM
  • Type: Information Disclosure
  • CVE/CVSS: CVE-2026-42208: CVSS 9.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)

 

Sources

Risks

LiteLLM is an AI gateway which centralizes API credentials for providers such as OpenAI and Anthropic. A critical, pre-authentication SQL injection vulnerability allows an unauthenticated remote attacker to extract all stored API keys and provider credentials. A successful attack is equivalent to losing all connected AI provider accounts simultaneously. Open-source intelligence reporting indicates that active exploitation attempts have been observed. Update immediately.

Description

The Bearer token value from incoming HTTP requests is concatenated directly into a SQL query without sanitization, allowing a remote unauthenticated attacker to inject arbitrary SQL before authentication occurs. Open-source intelligence suggests that threat actors are exploiting this vulnerability to exfiltrate API keys, credentials etc. This vulnerability is fixed in v1.83.7.

Recommended Actions

 Patch  
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.

Mitigate  
If upgrading is not immediately possible, the Centre for Cybersecurity Belgium strongly recommends to configure “set disable_error_logs: true” under general settings. This removes the path through which unauthenticated input reaches the vulnerable query.

Monitor/Detect 
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
 
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/report-incident.

While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
 
 

References