Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LiteLLM Security Flaw Exploited Rapidly Post-Disclosure

LiteLLM Security Flaw Exploited Rapidly Post-Disclosure

Posted on April 29, 2026 By CWS

A critical security vulnerability in BerriAI’s LiteLLM Python package has been exploited in the wild within just 36 hours following its public disclosure. This vulnerability, identified as CVE-2026-42208 and carrying a CVSS score of 9.3, is a severe SQL injection flaw that allows attackers to manipulate the LiteLLM proxy database.

Details of the LiteLLM Vulnerability

The security flaw stems from improper handling of API key checks, where a database query was constructed by directly inserting a user-supplied key into the query text. This oversight enables an unauthenticated attacker to send a crafted Authorization header to any LLM API route, such as POST /chat/completions, allowing them to interact with the database through the proxy’s error-handling path. Consequently, attackers could potentially read or alter sensitive data, gaining unauthorized access to the proxy and its managed credentials.

Recorded Exploitation Attempts

The issue was addressed in version 1.83.7-stable of LiteLLM, released on April 19, 2026. However, exploitation attempts were detected shortly after, with the first recorded attack occurring on April 26. The malicious activities originated from the IP address 65.111.27[.]132, carrying out two phases of attacks. The attacker targeted specific database tables containing sensitive information, indicating a deep understanding of the database structure.

Initially, the threat actor focused on tables such as “litellm_credentials.credential_values” and “litellm_config,” which store vital information about upstream LLM provider keys and the proxy environment. In a subsequent phase, the attacker switched to a different IP address, 65.111.25[.]67, to conduct further probing activities.

Impact and Recommendations

LiteLLM is a widely used open-source AI Gateway software, boasting over 45,000 stars and 7,600 forks on GitHub. The potential impact of this vulnerability is significant, as a successful database breach could lead to a cloud-account compromise, akin to a supply chain attack. Users are strongly urged to update their LiteLLM instances to the latest version. If immediate updating is not feasible, disabling error logs is recommended to prevent vulnerable query paths from being exploited.

The rapid exploitation of this vulnerability highlights the increasing speed at which attackers leverage newly disclosed flaws, emphasizing the need for prompt patching and vigilant security practices in managing open-source software dependencies.

As the cybersecurity landscape evolves, organizations must remain proactive in addressing vulnerabilities and safeguarding their digital assets against such swift and sophisticated threats.

The Hacker News Tags:BerriAI, cloud security, CVE-2026-42208, Cybersecurity, database security, LiteLLM, open source software, SQL injection, Vulnerability, zero-day exploit

Post navigation

Previous Post: Silver Fox Threat Group Launches New Malware Campaign
Next Post: Major GitHub Flaw Endangered Millions of Repositories

Related Posts

Lithuania Strengthens Cybersecurity Against AI Fraud Lithuania Strengthens Cybersecurity Against AI Fraud The Hacker News
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia The Hacker News
INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown The Hacker News
Why Exposed Credentials Remain Unfixed—and How to Change That Why Exposed Credentials Remain Unfixed—and How to Change That The Hacker News
Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More The Hacker News
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with 0K in Rewards Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Major GitHub Flaw Endangered Millions of Repositories
  • LiteLLM Security Flaw Exploited Rapidly Post-Disclosure
  • Silver Fox Threat Group Launches New Malware Campaign
  • Security Concerns Emerge for Electric Bikes and Scooters
  • Checkmarx Data Leak on Dark Web After Security Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Major GitHub Flaw Endangered Millions of Repositories
  • LiteLLM Security Flaw Exploited Rapidly Post-Disclosure
  • Silver Fox Threat Group Launches New Malware Campaign
  • Security Concerns Emerge for Electric Bikes and Scooters
  • Checkmarx Data Leak on Dark Web After Security Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark