<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 04:00:50 +0000</lastBuildDate>
    <item>
      <title>52f73e34-951c-4a93-b90b-57f3788068e4</title>
      <link>https://vulnerability.circl.lu/sighting/52f73e34-951c-4a93-b90b-57f3788068e4/export</link>
      <description>{"uuid": "52f73e34-951c-4a93-b90b-57f3788068e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkokzbugzf2x", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 53 interactions\nCVE-2026-3854: 48 interactions\nCVE-2026-42208: 22 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 53 interactions\nCVE-2026-3854: 31 interactions\nCVE-2026-5545: 17 interactions\n", "creation_timestamp": "2026-04-30T02:30:14.521566Z"}</description>
      <content:encoded>{"uuid": "52f73e34-951c-4a93-b90b-57f3788068e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkokzbugzf2x", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 53 interactions\nCVE-2026-3854: 48 interactions\nCVE-2026-42208: 22 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 53 interactions\nCVE-2026-3854: 31 interactions\nCVE-2026-5545: 17 interactions\n", "creation_timestamp": "2026-04-30T02:30:14.521566Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/52f73e34-951c-4a93-b90b-57f3788068e4/export</guid>
      <pubDate>Thu, 30 Apr 2026 02:30:14 +0000</pubDate>
    </item>
    <item>
      <title>ef26bacd-5247-4d8b-9a8e-faae66d330da</title>
      <link>https://vulnerability.circl.lu/sighting/ef26bacd-5247-4d8b-9a8e-faae66d330da/export</link>
      <description>{"uuid": "ef26bacd-5247-4d8b-9a8e-faae66d330da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42208", "type": "seen", "source": "https://infosec.exchange/users/Sempf/statuses/116491594726746257", "content": "This is the issue with AI in criminal hands. Speed to market.\nhttps://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html?m=1", "creation_timestamp": "2026-04-30T03:44:32.065811Z"}</description>
      <content:encoded>{"uuid": "ef26bacd-5247-4d8b-9a8e-faae66d330da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42208", "type": "seen", "source": "https://infosec.exchange/users/Sempf/statuses/116491594726746257", "content": "This is the issue with AI in criminal hands. Speed to market.\nhttps://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html?m=1", "creation_timestamp": "2026-04-30T03:44:32.065811Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ef26bacd-5247-4d8b-9a8e-faae66d330da/export</guid>
      <pubDate>Thu, 30 Apr 2026 03:44:32 +0000</pubDate>
    </item>
    <item>
      <title>33be73d7-f57e-4347-a7b7-bcb2f3d0a845</title>
      <link>https://vulnerability.circl.lu/sighting/33be73d7-f57e-4347-a7b7-bcb2f3d0a845/export</link>
      <description>{"uuid": "33be73d7-f57e-4347-a7b7-bcb2f3d0a845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42208", "type": "seen", "source": "https://bsky.app/profile/Sempf.infosec.exchange.ap.brid.gy/post/3mkop6eilvc62", "content": "This is the issue with AI in criminal hands. Speed to market.\n\nhttps://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html?m=1", "creation_timestamp": "2026-04-30T03:44:44.560735Z"}</description>
      <content:encoded>{"uuid": "33be73d7-f57e-4347-a7b7-bcb2f3d0a845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42208", "type": "seen", "source": "https://bsky.app/profile/Sempf.infosec.exchange.ap.brid.gy/post/3mkop6eilvc62", "content": "This is the issue with AI in criminal hands. Speed to market.\n\nhttps://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html?m=1", "creation_timestamp": "2026-04-30T03:44:44.560735Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/33be73d7-f57e-4347-a7b7-bcb2f3d0a845/export</guid>
      <pubDate>Thu, 30 Apr 2026 03:44:44 +0000</pubDate>
    </item>
    <item>
      <title>232595ee-ced4-4e63-a6c9-345cee9ba83a</title>
      <link>https://vulnerability.circl.lu/sighting/232595ee-ced4-4e63-a6c9-345cee9ba83a/export</link>
      <description>{"uuid": "232595ee-ced4-4e63-a6c9-345cee9ba83a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/allaboutsecurity.bsky.social/post/3mkovhifykk2s", "content": "LiteLLM-Sicherheitsl\u00fccke CVE-2026-42208: SQL-Injection binnen 36 Stunden nach Ver\u00f6ffentlichung aktiv ausgenutzt\nwww.all-about-security.de/litellm-sich...\n#cve #llm #cybersecurity #itsecurity #itsicherheit", "creation_timestamp": "2026-04-30T05:37:11.383339Z"}</description>
      <content:encoded>{"uuid": "232595ee-ced4-4e63-a6c9-345cee9ba83a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/allaboutsecurity.bsky.social/post/3mkovhifykk2s", "content": "LiteLLM-Sicherheitsl\u00fccke CVE-2026-42208: SQL-Injection binnen 36 Stunden nach Ver\u00f6ffentlichung aktiv ausgenutzt\nwww.all-about-security.de/litellm-sich...\n#cve #llm #cybersecurity #itsecurity #itsicherheit", "creation_timestamp": "2026-04-30T05:37:11.383339Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/232595ee-ced4-4e63-a6c9-345cee9ba83a/export</guid>
      <pubDate>Thu, 30 Apr 2026 05:37:11 +0000</pubDate>
    </item>
    <item>
      <title>b81f725e-0517-47de-8bbc-56b73f5102ab</title>
      <link>https://vulnerability.circl.lu/sighting/b81f725e-0517-47de-8bbc-56b73f5102ab/export</link>
      <description>{"uuid": "b81f725e-0517-47de-8bbc-56b73f5102ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://t.me/cibsecurity/89235", "content": "\ud83d\udd8b\ufe0f LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure \ud83d\udd8b\ufe0f\n\nIn yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge. The vulnerability, tracked as CVE202642208 CVSS score 9.3, is an SQL injection that could be exploited to modify the underlying.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2026-04-30T05:50:23.000000Z"}</description>
      <content:encoded>{"uuid": "b81f725e-0517-47de-8bbc-56b73f5102ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://t.me/cibsecurity/89235", "content": "\ud83d\udd8b\ufe0f LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure \ud83d\udd8b\ufe0f\n\nIn yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge. The vulnerability, tracked as CVE202642208 CVSS score 9.3, is an SQL injection that could be exploited to modify the underlying.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2026-04-30T05:50:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b81f725e-0517-47de-8bbc-56b73f5102ab/export</guid>
      <pubDate>Thu, 30 Apr 2026 05:50:23 +0000</pubDate>
    </item>
    <item>
      <title>ca15b137-275c-490d-9d20-8f029835143e</title>
      <link>https://vulnerability.circl.lu/sighting/ca15b137-275c-490d-9d20-8f029835143e/export</link>
      <description>{"uuid": "ca15b137-275c-490d-9d20-8f029835143e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/reconbee.bsky.social/post/3mkox5jjzkk2y", "content": "LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure reconbee.com/litellm-cve-...\n\n#LiteLLM #LLM #sqlinjection #SQL #cybersecurity #cyberattack", "creation_timestamp": "2026-04-30T06:07:26.116309Z"}</description>
      <content:encoded>{"uuid": "ca15b137-275c-490d-9d20-8f029835143e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/reconbee.bsky.social/post/3mkox5jjzkk2y", "content": "LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure reconbee.com/litellm-cve-...\n\n#LiteLLM #LLM #sqlinjection #SQL #cybersecurity #cyberattack", "creation_timestamp": "2026-04-30T06:07:26.116309Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ca15b137-275c-490d-9d20-8f029835143e/export</guid>
      <pubDate>Thu, 30 Apr 2026 06:07:26 +0000</pubDate>
    </item>
    <item>
      <title>f26c8738-f528-4881-91f9-3595bfdea218</title>
      <link>https://vulnerability.circl.lu/sighting/f26c8738-f528-4881-91f9-3595bfdea218/export</link>
      <description>{"uuid": "f26c8738-f528-4881-91f9-3595bfdea218", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/ransomnews.online/post/3mkphlxxytx2p", "content": "\ud83d\udea8 LiteLLM was hit 36 hours after disclosure\n\nCVE-2026-42208 is a pre-auth SQLi in #LiteLLM\u2019s proxy key verification flow, and #Sysdig saw attacks 36 hours after advisory indexing targeting API keys, provider credentials and env config.\n\n\ud83d\udd17 read more: www.securityweek.com/fresh-litell...\n\n#ransomNews", "creation_timestamp": "2026-04-30T11:01:46.650129Z"}</description>
      <content:encoded>{"uuid": "f26c8738-f528-4881-91f9-3595bfdea218", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/ransomnews.online/post/3mkphlxxytx2p", "content": "\ud83d\udea8 LiteLLM was hit 36 hours after disclosure\n\nCVE-2026-42208 is a pre-auth SQLi in #LiteLLM\u2019s proxy key verification flow, and #Sysdig saw attacks 36 hours after advisory indexing targeting API keys, provider credentials and env config.\n\n\ud83d\udd17 read more: www.securityweek.com/fresh-litell...\n\n#ransomNews", "creation_timestamp": "2026-04-30T11:01:46.650129Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f26c8738-f528-4881-91f9-3595bfdea218/export</guid>
      <pubDate>Thu, 30 Apr 2026 11:01:46 +0000</pubDate>
    </item>
    <item>
      <title>246af399-cb3e-4be5-ad39-274d2a3c0208</title>
      <link>https://vulnerability.circl.lu/sighting/246af399-cb3e-4be5-ad39-274d2a3c0208/export</link>
      <description>{"uuid": "246af399-cb3e-4be5-ad39-274d2a3c0208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mkqhpjd6ic2g", "content": "CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure\n\nAttackers quickly exploited a critical LiteLLM flaw (CVE-2026-42208) to access and modify sensitive database data via SQL injection. Attackers rapidly exploited a critical vulnerability in LiteLLM\u00a0Python pac\u2026\n#hackernews #llm #news", "creation_timestamp": "2026-04-30T20:36:25.396863Z"}</description>
      <content:encoded>{"uuid": "246af399-cb3e-4be5-ad39-274d2a3c0208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mkqhpjd6ic2g", "content": "CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure\n\nAttackers quickly exploited a critical LiteLLM flaw (CVE-2026-42208) to access and modify sensitive database data via SQL injection. Attackers rapidly exploited a critical vulnerability in LiteLLM\u00a0Python pac\u2026\n#hackernews #llm #news", "creation_timestamp": "2026-04-30T20:36:25.396863Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/246af399-cb3e-4be5-ad39-274d2a3c0208/export</guid>
      <pubDate>Thu, 30 Apr 2026 20:36:25 +0000</pubDate>
    </item>
    <item>
      <title>326908d6-228f-4f67-9ed3-92044253b5bf</title>
      <link>https://vulnerability.circl.lu/sighting/326908d6-228f-4f67-9ed3-92044253b5bf/export</link>
      <description>{"uuid": "326908d6-228f-4f67-9ed3-92044253b5bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42208", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mkr4ajgl2kvh", "content": "CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure https://securityaffairs.com/191483/hacking/cve-2026-42208-litellm-bug-exploited-36-hours-after-its-disclosure.html", "creation_timestamp": "2026-05-01T02:44:14.799425Z"}</description>
      <content:encoded>{"uuid": "326908d6-228f-4f67-9ed3-92044253b5bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42208", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mkr4ajgl2kvh", "content": "CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure https://securityaffairs.com/191483/hacking/cve-2026-42208-litellm-bug-exploited-36-hours-after-its-disclosure.html", "creation_timestamp": "2026-05-01T02:44:14.799425Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/326908d6-228f-4f67-9ed3-92044253b5bf/export</guid>
      <pubDate>Fri, 01 May 2026 02:44:14 +0000</pubDate>
    </item>
    <item>
      <title>a67f0e62-1ee1-4e59-8b77-c73493d8b1c0</title>
      <link>https://vulnerability.circl.lu/sighting/a67f0e62-1ee1-4e59-8b77-c73493d8b1c0/export</link>
      <description>{"uuid": "a67f0e62-1ee1-4e59-8b77-c73493d8b1c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "Telegram/T6MjwEy1GXd0xTLgBckUymGQqfeNIMlbkOpXvJPPSDtMl2M", "content": "", "creation_timestamp": "2026-05-03T15:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "a67f0e62-1ee1-4e59-8b77-c73493d8b1c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "Telegram/T6MjwEy1GXd0xTLgBckUymGQqfeNIMlbkOpXvJPPSDtMl2M", "content": "", "creation_timestamp": "2026-05-03T15:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a67f0e62-1ee1-4e59-8b77-c73493d8b1c0/export</guid>
      <pubDate>Sun, 03 May 2026 15:00:06 +0000</pubDate>
    </item>
  </channel>
</rss>
