ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·5/8/2026
CVE-2026-42208 added to CISA KEV: BerriAI LiteLLM
Status: ✅ Confirmed exploited in the wild
Date added: 2026-05-08
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Due date: 2026-05-11
Why this matters
BerriAI LiteLLM contains a SQL injection vulnerability that allows an attacker to read data from the proxy's database and potentially modify it, leading to unauthorised access to the proxy and the credentials it manages.
Sources
Lyrie Verdict
Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.
Validated sources
Related Articles
active exploitation
‼️🚨 Microsoft just patched three critical M365 Copilot data leak vulnerabilities. All three are network-reachable, unau
1 min read · 1 sources
active exploitation
Lots of zero-day exploits lately.
Of course, today's Dirty Frag exploit (CVE-2026-43284) requires the attacker to have l
1 min read · 1 sources
active exploitation
LOW: CVE-2026-42208 actively exploited — multiple vendors
1 min read · 4 sources