Hackers are exploiting a critical SQL injection vulnerability (CVE-2026-42208) in the LiteLLM open-source large-language model gateway, allowing unauthorized access to sensitive data stored in its database. A fix has been released in version 1.83.7, but instances running vulnerable versions should be treated as potentially compromised.
For a cybersecurity professional, the key takeaway from this content is the active exploitation of a critical SQL injection vulnerability (CVE-2026-42208) in LiteLLM. This flaw, which allows unauthorized access to sensitive data including API keys and credentials, was exploited within 36 hours of disclosure. It's crucial for security teams to upgrade to LiteLLM version 1.83.7 or apply recommended workarounds immediately, and to rotate credentials for any potentially compromised instances.