Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    CVE-2026-21023 | THREATINT

    April 29, 2026

    Debian Trixie pdns-recursor Important DoS vuln DSA-6234-1

    April 28, 2026

    Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw

    April 28, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw
    News

    Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw

    adminBy adminApril 28, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    LiteLLM

    Hackers are targeting sensitive information stored in the LiteLLM open-source large-language model (LLM) gateway by exploiting a critical vulnerability  tracked as CVE-2026-42208.

    The flaw is an SQL injection issue that occurs during LiteLLM’s proxy API key verification step. An attacker can exploit it without authentication by sending a specially crafted Authorization header to any LLM API route.

    This allows reading data from the proxy’s database and modifying it. According to the maintainer’s security advisory, threat actors could use it for “unauthorised access to the proxy and the credentials it manages.”

    image

    A fix was delivered in LiteLLM version 1.83.7 to replace string concatenation with parameterized queries.

    LiteLLM stores API keys, virtual and master keys, and environment/config secrets, so accessing its database allows hackers to read sensitive data they may then use to launch additional attacks.

    LiteLLM is a popular proxy/SDK middleware layer that enables users to call AI models via a single unified API. The project is widely used by developers of LLM apps and platforms managing multiple models. It has 45k stars and 7.6k forks on GitHub.

    The project has also recently been targeted in a supply-chain attack, where TeamPCP hackers released malicious PyPI packages that deployed an infostealer to harvest credentials, tokens, and secrets from infected systems.

    In a report from researchers at Sysdig, a cloud security company, say that CVE-2026-42208 exploitation started approximately 36 hours after the bug was disclosed publicly on April 24.

    Active exploitation activity

    The researchers observed deliberate and targeted exploitation attempts that sent crafted requests to ‘/chat/completions’ with a malicious ‘Authorization: Bearer’ header.

    These requests queried specific tables that contained API keys, provider (OpenAI, Anthropic, Bedrock) credentials, environment data, and configs.

    Sysdig explained that there were no probes against benign tables, and “the operator went straight to where the secrets live,” a strong indicator that the attacker knew exactly what to target.

    In the second phase of the attack, the threat actor switched IP addresses, likely for evasion, reran the same SQL injection attempts, but focused on the correct table names and structures derived in the previous phase, now using fewer, more precise payloads.

    Sysdig comments that, while 36 hours is not as quick as exploiting a recent flaw in Marimo, the attacks were targeted and specific.

    The researchers warned that exposed LiteLMM instances still running vulnerable versions should be treated as potentially compromised, and every virtual API key, master key, and provider credential stored in internet-exposed LiteLLM instances should be rotated.

    For those who can’t upgrade to LiteLLM 1.83.7 and later, the maintainers suggest the workaround of setting ‘disable_error_logs: true’ under ‘general_settings’ to block the path through which malicious inputs can reach the vulnerable query.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSmarterTools security advisory (AV26-398) – Canadian Centre for Cyber Security
    Next Article Debian Trixie pdns-recursor Important DoS vuln DSA-6234-1
    admin
    • Website

    Related Posts

    News

    Study Finds A Third of New Websites are AI-Generated

    April 28, 2026
    News

    5 Ways to Enhance Your Security Product Offering with VulnCheck | Blog

    April 28, 2026
    News

    Broken VECT 2.0 ransomware acts as a data wiper for large files

    April 28, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    CVE-2026-21023 | THREATINT

    April 29, 2026

    Debian Trixie pdns-recursor Important DoS vuln DSA-6234-1

    April 28, 2026

    Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw

    April 28, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.