TopVuln

High-risk vulnerability digests

CVE-2026-42208

  • CRITICAL

BerriAI LiteLLM SQL Injection Vulnerability

Details

CVSS v3
9.8
CVSS v4
9.3
NVD published
2026-05-08 04:16:19
CISA date
2026-05-08
EPSS
37.4% probability · 97.2th percentile — 2026-05-09
Affected versions
LiteLLM 1.81.16 to before 1.83.7
Summary
This unauthenticated SQL injection flaw affects LiteLLM AI proxy gateways, a common component for LLM deployments. Attackers can exploit the issue by sending a specially crafted Authorization header to any public LLM API route on the proxy. Successful exploitation allows attackers to read and potentially modify sensitive data stored in the proxy's database, including LLM provider API keys and user credentials.
Remediation
Upgrade LiteLLM to version 1.83.7 or later immediately. Restrict public access to LiteLLM proxy endpoints until the patch is applied. Audit your deployment for unauthorized access after patching to confirm no credentials were stolen.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.