CVE-2026-25802: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in QuantumNous new-api
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.10.8-alpha.9, a potential unsafe operation occurs in component `MarkdownRenderer.jsx`, allowing for Cross-Site Scripting(XSS) when the model outputs items containing `<script>` tag. Version 0.10.8-alpha.9 fixes the issue.
AI Analysis
Technical Summary
CVE-2026-25802 is a Cross-Site Scripting (XSS) vulnerability identified in the QuantumNous new-api, an AI asset management and large language model (LLM) gateway system. The vulnerability resides in the MarkdownRenderer.jsx component, which improperly neutralizes input during web page generation. Specifically, when the model outputs items containing <script> tags, the component fails to sanitize or escape these inputs, allowing malicious scripts to be injected and executed in the context of the user's browser. This flaw affects all versions prior to 0.10.8-alpha.9, where the issue has been addressed. The vulnerability has a CVSS 3.1 base score of 7.6, indicating high severity, with an attack vector of network, low attack complexity, requiring privileges and user interaction, and causing a scope change. The impact primarily compromises integrity by allowing script injection that can alter application behavior or steal sensitive data, with limited availability impact. No known exploits have been reported in the wild yet, but the vulnerability poses a significant risk given the widespread use of AI gateways and asset management platforms in enterprise environments. The vulnerability is classified under CWE-79, highlighting improper input neutralization during web page generation as the root cause.
Potential Impact
The vulnerability enables attackers to inject malicious scripts into web pages rendered by the QuantumNous new-api, potentially leading to unauthorized actions such as session hijacking, credential theft, or manipulation of AI asset management data. This can undermine the integrity of the system and trust in AI outputs, possibly causing operational disruptions or data breaches. Organizations relying on this platform for managing AI models and assets may face targeted attacks that compromise sensitive AI workflows or intellectual property. The requirement for user interaction and privileges limits exploitation somewhat but does not eliminate risk, especially in environments with many users or automated interactions. The scope change indicates that the vulnerability can affect components beyond the initial vulnerable module, increasing potential damage. The limited availability impact suggests denial-of-service is less likely but still possible through script-based attacks. Overall, the threat could disrupt AI service reliability and confidentiality, impacting sectors heavily invested in AI technologies.
Mitigation Recommendations
Organizations should immediately upgrade QuantumNous new-api to version 0.10.8-alpha.9 or later to remediate the vulnerability. Beyond patching, implement strict input validation and output encoding in all components that render user or model-generated content, especially those handling markdown or HTML. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of any injected scripts. Conduct thorough code reviews focusing on sanitization of dynamic content in UI components. Monitor logs and user activity for unusual script execution or injection attempts. Educate users about the risks of interacting with untrusted content within the platform. If upgrading is delayed, consider disabling or restricting features that render markdown content from untrusted sources. Finally, integrate automated security testing tools that detect XSS vulnerabilities during development and deployment cycles to prevent regressions.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, South Korea, Australia, India, China
CVE-2026-25802: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in QuantumNous new-api
Description
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.10.8-alpha.9, a potential unsafe operation occurs in component `MarkdownRenderer.jsx`, allowing for Cross-Site Scripting(XSS) when the model outputs items containing `<script>` tag. Version 0.10.8-alpha.9 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25802 is a Cross-Site Scripting (XSS) vulnerability identified in the QuantumNous new-api, an AI asset management and large language model (LLM) gateway system. The vulnerability resides in the MarkdownRenderer.jsx component, which improperly neutralizes input during web page generation. Specifically, when the model outputs items containing <script> tags, the component fails to sanitize or escape these inputs, allowing malicious scripts to be injected and executed in the context of the user's browser. This flaw affects all versions prior to 0.10.8-alpha.9, where the issue has been addressed. The vulnerability has a CVSS 3.1 base score of 7.6, indicating high severity, with an attack vector of network, low attack complexity, requiring privileges and user interaction, and causing a scope change. The impact primarily compromises integrity by allowing script injection that can alter application behavior or steal sensitive data, with limited availability impact. No known exploits have been reported in the wild yet, but the vulnerability poses a significant risk given the widespread use of AI gateways and asset management platforms in enterprise environments. The vulnerability is classified under CWE-79, highlighting improper input neutralization during web page generation as the root cause.
Potential Impact
The vulnerability enables attackers to inject malicious scripts into web pages rendered by the QuantumNous new-api, potentially leading to unauthorized actions such as session hijacking, credential theft, or manipulation of AI asset management data. This can undermine the integrity of the system and trust in AI outputs, possibly causing operational disruptions or data breaches. Organizations relying on this platform for managing AI models and assets may face targeted attacks that compromise sensitive AI workflows or intellectual property. The requirement for user interaction and privileges limits exploitation somewhat but does not eliminate risk, especially in environments with many users or automated interactions. The scope change indicates that the vulnerability can affect components beyond the initial vulnerable module, increasing potential damage. The limited availability impact suggests denial-of-service is less likely but still possible through script-based attacks. Overall, the threat could disrupt AI service reliability and confidentiality, impacting sectors heavily invested in AI technologies.
Mitigation Recommendations
Organizations should immediately upgrade QuantumNous new-api to version 0.10.8-alpha.9 or later to remediate the vulnerability. Beyond patching, implement strict input validation and output encoding in all components that render user or model-generated content, especially those handling markdown or HTML. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of any injected scripts. Conduct thorough code reviews focusing on sanitization of dynamic content in UI components. Monitor logs and user activity for unusual script execution or injection attempts. Educate users about the risks of interacting with untrusted content within the platform. If upgrading is delayed, consider disabling or restricting features that render markdown content from untrusted sources. Finally, integrate automated security testing tools that detect XSS vulnerabilities during development and deployment cycles to prevent regressions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T19:58:01.641Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699cfc3cbe58cf853bfd2f4d
Added to database: 2/24/2026, 1:17:48 AM
Last enriched: 3/3/2026, 8:25:19 PM
Last updated: 4/9/2026, 9:59:33 AM
Views: 130
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.