CVE Alert: CVE-2026-42208 - BerriAI - litellm - RedPacket Security

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used

RedPacket Security

Data Breaches Surge, Exposing Sensitive Info at AI Startups, Agencies

Data breaches are surging, with AI startups and agencies exposed, as seen in the alarming theft of 10 petabytes from a Chinese supercomputer and 4 terabytes from AI startup Mercor due to a supply-chain vulnerability. These incidents highlight the hidden risks of connecting data to AI models, creating sensitive blind spots that leave large…

https://osintsights.com/data-breaches-surge-exposing-sensitive-info-at-ai-startups-agencies?utm_source=mastodon&utm_medium=social

#AiStartups #DataBreaches #EmergingThreats #Litellm #Mercor

Data Breaches Surge, Exposing Sensitive Info at AI Startups, Agencies

Learn how data breaches at AI startups and agencies expose sensitive info and discover steps to protect your organization from supply-chain attacks today.

OSINTSights

Embeddings models from #Scaleway weren't working with #LiteLLM. Couple of hours of searching and testing, it's a three line fix. 😅

https://github.com/BerriAI/litellm/pull/25395/changes

fix(embedding): omit null encoding_format for openai requests by meutsabdahal · Pull Request #25395 · BerriAI/litellm

Relevant issues Fixes #25388 Pre-Submission checklist Please complete all items before asking a LiteLLM maintainer to review your PR I have Added testing in the tests/test_litellm/ directory, Add...

GitHub
Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw

Hackers are targeting sensitive information stored in the LiteLLM open-source large-language model (LLM) gateway by exploiting a critical vulnerability  tracked as CVE-2026-42208.

BleepingComputer
CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure

Attackers quickly exploited a critical LiteLLM flaw (CVE-2026-42208) to access and modify sensitive database data via SQL injection.

Security Affairs

🔐 LiteLLM sotto assedio: scoperta falla che mette a rischio le chiavi IA. Tempo di rinforzare la sicurezza! #LiteLLM #CyberSecurity

🔗 https://www.tomshw.it/hardware/litellm-sotto-attacco-falla-espone-chiavi-ia

LiteLLM sotto attacco: la falla espone le chiavi IA

CVE-2026-42208 consente SQL injection senza login sul gateway LLM: nel mirino API key, token e segreti cloud già sfruttati.

Tom's Hardware

LiteLLM SQL Flaw Exploited 36 Hours After Disclosure

A critical SQL injection flaw, CVE-2026-42208, was exploited just 36 hours after its disclosure, putting vulnerable LiteLLM versions at risk of unauthorized database access. The bug, with a CVSS score of 9.3, allows unauthenticated callers to reach a vulnerable database query through the proxy's error-handling path.

https://osintsights.com/litellm-sql-flaw-exploited-36-hours-after-disclosure?utm_source=mastodon&utm_medium=social

#SqlInjection #Litellm #Cve202642208 #Python #EmergingThreats

LiteLLM SQL Flaw Exploited 36 Hours After Disclosure

Learn how LiteLLM SQL flaw CVE-2026-42208 was exploited just 36 hours after disclosure and upgrade to secure version 1.83.7-stable now.

OSINTSights

Urgent security alert: Hackers are exploiting a pre-authentication SQL injection flaw (CVE-2026-42208) in LiteLLM, allowing them to bypass authentication and exfiltrate sensitive AI provider credentials. Sysdig Threat Research Team observed attackers moving directly to high-value tables, demonstrating precise knowledge. This vulnerability's impact is comparable to a full cloud-account…

https://www.tpp.blog/1dqwzx7

#cybersecurity #litellm #cve202642208

🤖 This post was AI-generated.

Hackers Exploit LiteLLM SQL Flaw for Sensitive Data Access

Within just 36 hours of being publicly disclosed, a critical SQL injection flaw in LiteLLM, known as CVE-2026-42208, was actively exploited by hackers, allowing them to access sensitive data without authentication. This alarming vulnerability highlights the importance of swift patching, with LiteLLM version 1.83.7 now available to…

https://osintsights.com/hackers-exploit-litellm-sql-flaw-for-sensitive-data-access?utm_source=mastodon&utm_medium=social

#SqlInjection #Litellm #Cve202642208 #EmergingThreats #PreauthenticationExploit

Hackers Exploit LiteLLM SQL Flaw for Sensitive Data Access

Learn how hackers exploit LiteLLM SQL flaw CVE-2026-42208 for sensitive data access and protect your systems now with essential security tips and updates.

OSINTSights

Auto AI Router: высокопроизводительный прокси-роутер для LLM API на Go

Auto AI Router — лёгкий прокси-роутер на Go, который принимает запросы в формате OpenAI API и прозрачно распределяет их между несколькими провайдерами и ключами с балансировкой нагрузки, защитой от банов и контролем RPM-лимитов. Читать далее (многобукав)

https://habr.com/ru/articles/1027878/

#go #github #llm #openai #vertex #gemini #litellm #docker #dockercompose #router

Auto AI Router: высокопроизводительный прокси-роутер для LLM API на Go

Если вы работаете с LLM-провайдерами, то наверняка сталкивались с одной и той же проблемой: у OpenAI лимит 100 RPM на ключ, у Vertex AI — свои квоты на проект, у Anthropic — отдельные ограничения. В...

Хабр