Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25591: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in QuantumNous new-api

0
High
VulnerabilityCVE-2026-25591cvecve-2026-25591cwe-943
Published: Tue Feb 24 2026 (02/24/2026, 00:41:30 UTC)
Source: CVE Database V5
Vendor/Project: QuantumNous
Product: new-api

Description

CVE-2026-25591 is a high-severity SQL LIKE wildcard injection vulnerability in QuantumNous new-api versions prior to 0. 10. 8-alpha. 10. It affects the /api/token/search endpoint, where authenticated users can supply unescaped wildcard characters in keyword and token parameters. This improper neutralization of special elements in SQL query logic (CWE-943) allows attackers to craft expensive search patterns that cause resource exhaustion, leading to denial of service. No user interaction beyond authentication is needed, and no known exploits are reported yet. The vulnerability is patched in version 0. 10. 8-alpha.

AI-Powered Analysis

AILast updated: 02/24/2026, 01:31:46 UTC

Technical Analysis

QuantumNous new-api, an AI asset management and large language model gateway system, suffers from a SQL LIKE wildcard injection vulnerability identified as CVE-2026-25591. The flaw exists in the /api/token/search endpoint, which accepts user-supplied 'keyword' and 'token' parameters concatenated directly into SQL LIKE clauses without escaping special wildcard characters such as '%' and '_'. This improper neutralization (CWE-943) enables authenticated users to inject crafted patterns that cause the database to execute highly expensive queries. These queries can exhaust server resources, resulting in denial of service conditions. The vulnerability requires authentication but no additional user interaction, and it does not compromise confidentiality or integrity directly. The issue affects all versions prior to 0.10.8-alpha.10, where a patch was introduced to properly escape or sanitize input parameters to prevent wildcard injection. Although no exploits are currently known in the wild, the vulnerability's nature and ease of exploitation make it a significant risk for service availability in affected deployments.

Potential Impact

The primary impact of CVE-2026-25591 is denial of service through resource exhaustion on the database and application servers hosting QuantumNous new-api. Attackers with valid credentials can degrade or completely disrupt service availability by submitting malicious search patterns that trigger expensive SQL LIKE queries. This can lead to downtime, degraded performance, and potential cascading effects on dependent AI asset management workflows and LLM gateway operations. Organizations relying on new-api for critical AI infrastructure may face operational interruptions, loss of productivity, and reputational damage. Since the vulnerability does not expose data confidentiality or integrity directly, the impact is focused on availability. However, prolonged denial of service could indirectly affect business continuity and incident response resources.

Mitigation Recommendations

To mitigate CVE-2026-25591, organizations should immediately upgrade QuantumNous new-api to version 0.10.8-alpha.10 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement input validation and sanitization on the 'keyword' and 'token' parameters to escape or reject SQL wildcard characters ('%', '_') before they reach the database layer. Employ rate limiting and monitoring on the /api/token/search endpoint to detect and block abnormal query patterns indicative of abuse. Restrict access to the token search functionality to only trusted and necessary users to reduce attack surface. Additionally, consider deploying database query timeouts and resource usage limits to prevent excessive resource consumption from malicious queries. Regularly audit logs for unusual search activity and maintain an incident response plan for denial of service events.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-03T01:02:46.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cfc3cbe58cf853bfd2f48

Added to database: 2/24/2026, 1:17:48 AM

Last enriched: 2/24/2026, 1:31:46 AM

Last updated: 2/24/2026, 6:07:17 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats