Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32879: CWE-287: Improper Authentication in QuantumNous new-api

0
Medium
VulnerabilityCVE-2026-32879cvecve-2026-32879cwe-287
Published: Mon Mar 23 2026 (03/23/2026, 19:24:16 UTC)
Source: CVE Database V5
Vendor/Project: QuantumNous
Product: new-api

Description

CVE-2026-32879 is a medium-severity improper authentication vulnerability in QuantumNous new-api versions 0. 10. 0 through 0. 11. 9-alpha. 1. The flaw allows an authenticated user with a registered passkey to bypass the WebAuthn assertion step in the secure verification flow, effectively weakening the step-up authentication process. This vulnerability does not require user interaction and affects confidentiality but not integrity or availability. No patches are currently available, so organizations should avoid relying on passkey-based step-up verification for privileged actions and instead require TOTP or 2FA or restrict access to sensitive endpoints. The vulnerability impacts organizations using QuantumNous new-api, particularly those leveraging its AI asset management and LLM gateway capabilities.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:34:50 UTC

Technical Analysis

CVE-2026-32879 is an improper authentication vulnerability (CWE-287) found in QuantumNous new-api, a platform that serves as a large language model (LLM) gateway and AI asset management system. Starting from version 0.10.0 up to 0.11.9-alpha.1, a logic flaw in the universal secure verification flow allows an authenticated user who possesses a registered passkey to bypass the required WebAuthn assertion step. Normally, WebAuthn assertions are a critical part of multi-factor or step-up authentication, ensuring that the user proves possession of a hardware or software authenticator. Due to this flaw, the system incorrectly accepts the presence of a registered passkey without verifying the actual WebAuthn assertion, effectively weakening the authentication process. This vulnerability compromises the confidentiality of privileged operations by allowing unauthorized access to secure-verification-protected endpoints without completing the full verification. The flaw does not affect integrity or availability and requires the attacker to be an authenticated user with a registered passkey, thus limiting the attack vector to insiders or compromised accounts. No patches are currently available, and the vendor has advised against relying on passkey-based step-up verification until a fix is released. Instead, organizations should enforce alternative second-factor methods such as TOTP or other 2FA mechanisms or restrict access to sensitive endpoints. The CVSS v3.1 score is 4.9 (medium), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact.

Potential Impact

The vulnerability primarily impacts the confidentiality of sensitive operations protected by step-up authentication in QuantumNous new-api. Attackers who have authenticated access with a registered passkey can bypass the WebAuthn assertion, potentially gaining unauthorized access to privileged functions or sensitive AI asset management features. This could lead to exposure of confidential AI models, data, or operational controls. Since the flaw requires prior authentication with a registered passkey, the risk is higher for insider threats or compromised accounts. The absence of a patch increases the window of exposure. Organizations relying on passkey-based step-up verification for critical actions may face increased risk of unauthorized access, data leakage, or misuse of AI assets. The vulnerability does not affect system integrity or availability, so it is less likely to cause service disruption or data tampering. However, the confidentiality breach could have significant operational and reputational consequences, especially for organizations handling sensitive AI workloads or intellectual property.

Mitigation Recommendations

Until a patched version is released, organizations should not rely on passkey-based step-up verification for privileged or sensitive operations in QuantumNous new-api. Instead, enforce alternative multi-factor authentication methods such as TOTP (Time-based One-Time Password) or other forms of 2FA that do not depend on the vulnerable WebAuthn flow. Temporarily restrict or disable access to endpoints protected by the affected secure-verification mechanism if operationally feasible. Implement strict monitoring and logging of authentication and authorization events to detect suspicious activities involving passkey usage. Conduct thorough account audits to identify and remediate compromised or suspicious accounts with registered passkeys. Educate users and administrators about the vulnerability and the importance of using strong, alternative authentication methods. Maintain close communication with QuantumNous for updates on patches or workarounds. Consider network segmentation and least privilege principles to limit the impact of any unauthorized access. Finally, prepare incident response plans to address potential exploitation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-16T21:03:44.420Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1986ff4197a8e3b86e7bf

Added to database: 3/23/2026, 7:45:51 PM

Last enriched: 3/30/2026, 8:34:50 PM

Last updated: 5/7/2026, 4:23:14 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses