CVE-2026-25591: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in QuantumNous new-api
CVE-2026-25591 is a high-severity SQL LIKE wildcard injection vulnerability in QuantumNous new-api versions prior to 0. 10. 8-alpha. 10. It affects the /api/token/search endpoint, where authenticated users can supply unescaped wildcard characters in keyword and token parameters. This improper neutralization of special elements in SQL query logic (CWE-943) allows attackers to craft expensive search patterns that cause resource exhaustion, leading to denial of service. No user interaction beyond authentication is needed, and no known exploits are reported yet. The vulnerability is patched in version 0. 10. 8-alpha.
AI Analysis
Technical Summary
QuantumNous new-api, an AI asset management and large language model gateway system, suffers from a SQL LIKE wildcard injection vulnerability identified as CVE-2026-25591. The flaw exists in the /api/token/search endpoint, which accepts user-supplied 'keyword' and 'token' parameters concatenated directly into SQL LIKE clauses without escaping special wildcard characters such as '%' and '_'. This improper neutralization (CWE-943) enables authenticated users to inject crafted patterns that cause the database to execute highly expensive queries. These queries can exhaust server resources, resulting in denial of service conditions. The vulnerability requires authentication but no additional user interaction, and it does not compromise confidentiality or integrity directly. The issue affects all versions prior to 0.10.8-alpha.10, where a patch was introduced to properly escape or sanitize input parameters to prevent wildcard injection. Although no exploits are currently known in the wild, the vulnerability's nature and ease of exploitation make it a significant risk for service availability in affected deployments.
Potential Impact
The primary impact of CVE-2026-25591 is denial of service through resource exhaustion on the database and application servers hosting QuantumNous new-api. Attackers with valid credentials can degrade or completely disrupt service availability by submitting malicious search patterns that trigger expensive SQL LIKE queries. This can lead to downtime, degraded performance, and potential cascading effects on dependent AI asset management workflows and LLM gateway operations. Organizations relying on new-api for critical AI infrastructure may face operational interruptions, loss of productivity, and reputational damage. Since the vulnerability does not expose data confidentiality or integrity directly, the impact is focused on availability. However, prolonged denial of service could indirectly affect business continuity and incident response resources.
Mitigation Recommendations
To mitigate CVE-2026-25591, organizations should immediately upgrade QuantumNous new-api to version 0.10.8-alpha.10 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement input validation and sanitization on the 'keyword' and 'token' parameters to escape or reject SQL wildcard characters ('%', '_') before they reach the database layer. Employ rate limiting and monitoring on the /api/token/search endpoint to detect and block abnormal query patterns indicative of abuse. Restrict access to the token search functionality to only trusted and necessary users to reduce attack surface. Additionally, consider deploying database query timeouts and resource usage limits to prevent excessive resource consumption from malicious queries. Regularly audit logs for unusual search activity and maintain an incident response plan for denial of service events.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, Netherlands, Singapore
CVE-2026-25591: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in QuantumNous new-api
Description
CVE-2026-25591 is a high-severity SQL LIKE wildcard injection vulnerability in QuantumNous new-api versions prior to 0. 10. 8-alpha. 10. It affects the /api/token/search endpoint, where authenticated users can supply unescaped wildcard characters in keyword and token parameters. This improper neutralization of special elements in SQL query logic (CWE-943) allows attackers to craft expensive search patterns that cause resource exhaustion, leading to denial of service. No user interaction beyond authentication is needed, and no known exploits are reported yet. The vulnerability is patched in version 0. 10. 8-alpha.
AI-Powered Analysis
Technical Analysis
QuantumNous new-api, an AI asset management and large language model gateway system, suffers from a SQL LIKE wildcard injection vulnerability identified as CVE-2026-25591. The flaw exists in the /api/token/search endpoint, which accepts user-supplied 'keyword' and 'token' parameters concatenated directly into SQL LIKE clauses without escaping special wildcard characters such as '%' and '_'. This improper neutralization (CWE-943) enables authenticated users to inject crafted patterns that cause the database to execute highly expensive queries. These queries can exhaust server resources, resulting in denial of service conditions. The vulnerability requires authentication but no additional user interaction, and it does not compromise confidentiality or integrity directly. The issue affects all versions prior to 0.10.8-alpha.10, where a patch was introduced to properly escape or sanitize input parameters to prevent wildcard injection. Although no exploits are currently known in the wild, the vulnerability's nature and ease of exploitation make it a significant risk for service availability in affected deployments.
Potential Impact
The primary impact of CVE-2026-25591 is denial of service through resource exhaustion on the database and application servers hosting QuantumNous new-api. Attackers with valid credentials can degrade or completely disrupt service availability by submitting malicious search patterns that trigger expensive SQL LIKE queries. This can lead to downtime, degraded performance, and potential cascading effects on dependent AI asset management workflows and LLM gateway operations. Organizations relying on new-api for critical AI infrastructure may face operational interruptions, loss of productivity, and reputational damage. Since the vulnerability does not expose data confidentiality or integrity directly, the impact is focused on availability. However, prolonged denial of service could indirectly affect business continuity and incident response resources.
Mitigation Recommendations
To mitigate CVE-2026-25591, organizations should immediately upgrade QuantumNous new-api to version 0.10.8-alpha.10 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement input validation and sanitization on the 'keyword' and 'token' parameters to escape or reject SQL wildcard characters ('%', '_') before they reach the database layer. Employ rate limiting and monitoring on the /api/token/search endpoint to detect and block abnormal query patterns indicative of abuse. Restrict access to the token search functionality to only trusted and necessary users to reduce attack surface. Additionally, consider deploying database query timeouts and resource usage limits to prevent excessive resource consumption from malicious queries. Regularly audit logs for unusual search activity and maintain an incident response plan for denial of service events.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-03T01:02:46.716Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699cfc3cbe58cf853bfd2f48
Added to database: 2/24/2026, 1:17:48 AM
Last enriched: 2/24/2026, 1:31:46 AM
Last updated: 2/24/2026, 6:07:17 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24314: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in SAP_SE S/4HANA (Manage Payment Media)
MediumCVE-2026-3070: Cross Site Scripting in SourceCodester Modern Image Gallery App
MediumCVE-2026-3069: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3068: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3067: Path Traversal in HummerRisk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.