CVE-2026-42208: Pre-Auth SQLi Actively Exploited in LiteLLM
Threat actors are exploiting a critical pre-authentication SQL injection in the LiteLLM proxy to exfiltrate master API keys and cloud provider credentials.
Threat actors are actively exploiting a critical pre-authentication SQL injection vulnerability in LiteLLM, an open-source gateway used to manage access to language models. Security researchers reported the active exploitation on April 28, 2026, observing targeted attacks designed to extract master API keys and cloud provider credentials. The flaw allows unauthenticated HTTP clients to execute arbitrary SQL commands against the proxy’s underlying PostgreSQL database.
The Injection Mechanism
The vulnerability, tracked as CVE-2026-42208, stems from a flaw in the proxy API key verification step. In affected versions of LiteLLM, the value supplied in the Authorization: Bearer header is concatenated directly into a SQL SELECT statement without proper parameter binding.
By inserting a single quote into the authorization header, such as sk-litellm', an attacker breaks out of the intended query against the LiteLLM_VerificationToken table. Because this injection occurs during the initial authentication check, the attack is fully pre-authentication. Any external client that can reach the default LiteLLM proxy port can append arbitrary SQL commands to the execution path.
Exfiltration Scope
Sysdig Threat Research detected the first exploitation attempts approximately 36 hours and seven minutes after the vulnerability was indexed in the GitHub Advisory Database on April 24, 2026. The observed threat actors utilized IP rotation to evade basic rate limits and demonstrated prior knowledge of the internal LiteLLM schema.
Attackers executed UNION SELECT statements coupled with column-count enumeration to exfiltrate data from three specific tables:
LiteLLM_VerificationToken: Contains virtual API keys and the master key.litellm_credentials: Holds stored provider credentials for upstream services like OpenAI, Anthropic, and AWS Bedrock.litellm_config: Stores proxy environment variables and runtime configurations.
The immediate impact of a successful breach is comprehensive cloud account compromise. By design, LiteLLM centralizes billing and access for multiple paid AI providers. Once threat actors extract the master key, they can replay requests against the /chat/completions endpoint from any external IP address, bypassing internal access controls.
Remediation Path
This incident follows a separate security event in late March 2026 involving malicious PyPI packages published by the TeamPCP group. Following that supply-chain breach, the LiteLLM maintainers initiated a comprehensive security audit with Veria Labs.
The maintainers have released LiteLLM version 1.83.7 to resolve CVE-2026-42208 by replacing the vulnerable string concatenation with parameterized queries. The flaw affects versions 1.81.16 through 1.83.6.
Administrators operating internet-facing instances must upgrade to version 1.83.7 immediately. All virtual API keys, master keys, and upstream provider credentials stored in the database must be rotated, as logging alone cannot definitively rule out exfiltration prior to patching. For deployments unable to upgrade immediately, setting disable_error_logs: true under general_settings blocks the specific path through which malicious inputs reach the vulnerable query.
Get Insanely Good at AI
The book for developers who want to understand how AI actually works. LLMs, prompt engineering, RAG, AI agents, and production systems.
Keep Reading
How to Use Symbolic Execution for Automated BPF Analysis
Learn how Cloudflare uses the Z3 theorem prover to instantly generate magic packets and reverse-engineer BPF bytecode for security research.
Cohere Acquires Aleph Alpha in $20B Sovereign AI Merger
Cohere is acquiring German AI firm Aleph Alpha to create a $20 billion transatlantic entity focused on sovereign AI for regulated European enterprises.
Claude Mythos Can Hack Autonomously, and the UK Is Worried
The UK government urges businesses to harden defenses after Anthropic's Claude Mythos Preview demonstrates unprecedented autonomous hacking and zero-day discovery.
A Critical Nginx UI Flaw Is Being Actively Exploited
The 'MCPwn' flaw (CVE-2026-33032) allows unauthenticated attackers to hijack Nginx UI instances via a neglected AI protocol endpoint.
Developer Claims to Crack Google SynthID AI Watermarking
A new open-source tool dubbed 'reverse-SynthID' claims to bypass Google DeepMind’s invisible watermarks using signal processing and spectral analysis.