Pre-Auth SQLi Flaw in LiteLLM Gateway Actively Exploited to Steal AI Credentials

Dev.to / 5/2/2026

📰 NewsDeveloper Stack & InfrastructureSignals & Early TrendsIndustry & Market Moves

Key Points

  • A critical unauthenticated SQL injection vulnerability (CVE-2026-42208) in LiteLLM allows attackers to extract API keys, provider credentials, and configuration secrets from the LiteLLM gateway’s database.
  • The flaw has been actively exploited shortly after public disclosure—within 36 hours—and attackers specifically targeted tables holding OpenAI, Anthropic, and Bedrock credentials.
  • Because LiteLLM is widely adopted as an LLM proxy/SDK middleware, the stolen credentials could be reused to launch large-scale follow-on attacks against downstream AI infrastructure.
  • The article points readers to a technical deep-dive by Grid the Grey for investigation details and exploitation context.

Forensic Summary

A critical unauthenticated SQL injection vulnerability (CVE-2026-42208) in LiteLLM, a widely-used LLM proxy and SDK middleware, is being actively exploited to extract API keys, provider credentials, and configuration secrets from the proxy database. Exploitation began within 36 hours of public disclosure, with attackers demonstrating precise targeting of sensitive tables containing OpenAI, Anthropic, and Bedrock credentials. The stolen credentials could enable downstream attacks against AI infrastructure at scale, given LiteLLM's broad adoption across LLM application ecosystems.

Read the full technical deep-dive on Grid the Grey: https://gridthegrey.com/posts/pre-auth-sqli-flaw-in-litellm-gateway-actively-exploited-to-steal-ai-credentials/