Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw
Summary
Hackers are actively exploiting CVE-2026-42208, a critical SQL injection flaw (a type of attack where malicious code is hidden in input to manipulate database queries) in LiteLLM, an open-source gateway that lets developers access multiple AI models through one interface. The vulnerability allows attackers to bypass authentication and steal sensitive data like API keys and credentials stored in the proxy's database, which they can then use to attack other systems.
Solution / Mitigation
LiteLLM released a fix in version 1.83.7 that replaces string concatenation with parameterized queries (a safer way to construct database queries). For users unable to upgrade immediately, maintainers suggest the workaround of setting 'disable_error_logs: true' under 'general_settings' to block the path through which malicious inputs can reach the vulnerable query. Additionally, organizations with exposed LiteLLM instances should rotate all virtual API keys, master keys, and provider credentials.
Classification
Affected Vendors
Related Issues
CVE-2026-34371: LibreChat is a ChatGPT clone with additional features. Prior to 0.8.4, LibreChat trusts the name field returned by the e
CVE-2024-27444: langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-
Original source: https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw/
First tracked: April 28, 2026 at 08:00 PM
Classified by LLM (prompt v3) · confidence: 92%