Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30886: CWE-639: Authorization Bypass Through User-Controlled Key in QuantumNous new-api

0
Medium
VulnerabilityCVE-2026-30886cvecve-2026-30886cwe-639
Published: Mon Mar 23 2026 (03/23/2026, 19:18:34 UTC)
Source: CVE Database V5
Vendor/Project: QuantumNous
Product: new-api

Description

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.11.4-alpha.2, an Insecure Direct Object Reference (IDOR) vulnerability in the video proxy endpoint (`GET /v1/videos/:task_id/content`) allows any authenticated user to access video content belonging to other users and causes the server to authenticate to upstream AI providers (Google Gemini, OpenAI) using credentials derived from tasks they do not own. The missing authorization check is a single function call — `model.GetByOnlyTaskId(taskID)` queries by `task_id` alone with no `user_id` filter, while every other task-lookup in the codebase enforces ownership via `model.GetByTaskId(userId, taskID)`. Version 0.11.4-alpha.2 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:17:50 UTC

Technical Analysis

QuantumNous new-api, an LLM gateway and AI asset management system, contained an authorization bypass vulnerability identified as CVE-2026-30886. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key) and manifests as an Insecure Direct Object Reference (IDOR) in the video proxy endpoint (`GET /v1/videos/:task_id/content`). Specifically, the API function `model.GetByOnlyTaskId(taskID)` retrieves video content based solely on the task_id parameter without validating that the requesting user owns the task. This contrasts with other task lookups in the codebase that require both userId and taskID, ensuring ownership verification. As a result, any authenticated user can access video content belonging to other users. Additionally, this flaw causes the server to authenticate to upstream AI providers such as Google Gemini and OpenAI using credentials derived from unauthorized tasks, potentially exposing sensitive credentials or enabling unauthorized API usage. The vulnerability affects all versions prior to 0.11.4-alpha.2, where a patch was introduced to enforce proper ownership checks by including userId in the query. The CVSS v3.1 score is 6.5 (medium severity), with an attack vector of network, low attack complexity, requiring privileges (authenticated user), no user interaction, and impacting confidentiality but not integrity or availability. No known exploits are reported in the wild as of the publication date.

Potential Impact

This vulnerability allows authenticated users to access video content and AI task credentials that belong to other users, leading to unauthorized disclosure of potentially sensitive or proprietary information. For organizations, this can result in data leakage, violation of privacy policies, and exposure of AI provider credentials that might be used to perform unauthorized operations or incur unexpected costs. The misuse of upstream AI credentials could also lead to reputational damage or further compromise if attackers leverage these credentials for malicious activities. Since the flaw does not affect data integrity or availability, the primary impact is confidentiality loss. However, the scope of affected systems is significant for any organization deploying QuantumNous new-api versions prior to 0.11.4-alpha.2, especially those handling sensitive AI workloads or proprietary video content. The requirement for authentication limits exploitation to insiders or compromised accounts, but the ease of exploitation is low complexity once authenticated.

Mitigation Recommendations

Organizations should immediately upgrade QuantumNous new-api to version 0.11.4-alpha.2 or later, where the authorization bypass has been patched by enforcing user ownership checks in task queries. Until upgrade is possible, implement strict access controls and monitoring on the video proxy endpoint to detect anomalous access patterns, such as users requesting video content for tasks they do not own. Conduct audits of user permissions and ensure least privilege principles are enforced to reduce the risk of insider exploitation. Additionally, review and rotate any AI provider credentials that may have been exposed or misused due to this vulnerability. Implement logging and alerting on API calls to upstream AI providers to detect unauthorized usage. Finally, perform a security review of all API endpoints to ensure consistent authorization checks are applied, preventing similar IDOR issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-06T00:04:56.700Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1986ff4197a8e3b86e7bb

Added to database: 3/23/2026, 7:45:51 PM

Last enriched: 3/30/2026, 8:17:50 PM

Last updated: 5/8/2026, 6:17:40 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses