Skip to main content

LiteLLM Pre-Authentication SQL Injection – Added to CISA KEV (CVE-2026-42208)

Scope: LiteLLM Proxy Versions 1.81.16 – 1.83.6

Severity: Red

CISA added CVE-2026-42208 to its Known Exploited Vulnerabilities catalog on May 8, 2026, requiring federal agencies to patch by May 11, after confirmed active exploitation was observed just 36 hours after public disclosure. The flaw is a pre-authentication SQL injection in LiteLLM's API key verification path — an attacker with no credentials can send a single crafted Authorization: Bearer header to any LLM API route and extract all virtual keys, stored LLM provider credentials, and proxy environment variables from the PostgreSQL backend, effectively gaining access to every AI provider account the proxy manages. Organizations should upgrade to LiteLLM version 1.83.7 or later immediately; if patching cannot be done at once, set disable_error_logs: true under general_settings as an interim measure, restrict proxy access behind a firewall or VPN, and rotate every LLM provider API key and cloud credential stored in the proxy database.

The Uganda National CERT and Coordination Center (CERT.UG/CC) encourages users and administrators to review the recommendations and apply the necessary updates.