CVE-2026-32879: CWE-287: Improper Authentication in QuantumNous new-api
CVE-2026-32879 is a medium-severity improper authentication vulnerability in QuantumNous new-api versions 0. 10. 0 through 0. 11. 9-alpha. 1. The flaw allows an authenticated user with a registered passkey to bypass the WebAuthn assertion step in the secure verification flow, effectively weakening the step-up authentication process. This vulnerability does not require user interaction and affects confidentiality but not integrity or availability. No patches are currently available, so organizations should avoid relying on passkey-based step-up verification for privileged actions and instead require TOTP or 2FA or restrict access to sensitive endpoints. The vulnerability impacts organizations using QuantumNous new-api, particularly those leveraging its AI asset management and LLM gateway capabilities.
AI Analysis
Technical Summary
CVE-2026-32879 is an improper authentication vulnerability (CWE-287) found in QuantumNous new-api, a platform that serves as a large language model (LLM) gateway and AI asset management system. Starting from version 0.10.0 up to 0.11.9-alpha.1, a logic flaw in the universal secure verification flow allows an authenticated user who possesses a registered passkey to bypass the required WebAuthn assertion step. Normally, WebAuthn assertions are a critical part of multi-factor or step-up authentication, ensuring that the user proves possession of a hardware or software authenticator. Due to this flaw, the system incorrectly accepts the presence of a registered passkey without verifying the actual WebAuthn assertion, effectively weakening the authentication process. This vulnerability compromises the confidentiality of privileged operations by allowing unauthorized access to secure-verification-protected endpoints without completing the full verification. The flaw does not affect integrity or availability and requires the attacker to be an authenticated user with a registered passkey, thus limiting the attack vector to insiders or compromised accounts. No patches are currently available, and the vendor has advised against relying on passkey-based step-up verification until a fix is released. Instead, organizations should enforce alternative second-factor methods such as TOTP or other 2FA mechanisms or restrict access to sensitive endpoints. The CVSS v3.1 score is 4.9 (medium), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact.
Potential Impact
The vulnerability primarily impacts the confidentiality of sensitive operations protected by step-up authentication in QuantumNous new-api. Attackers who have authenticated access with a registered passkey can bypass the WebAuthn assertion, potentially gaining unauthorized access to privileged functions or sensitive AI asset management features. This could lead to exposure of confidential AI models, data, or operational controls. Since the flaw requires prior authentication with a registered passkey, the risk is higher for insider threats or compromised accounts. The absence of a patch increases the window of exposure. Organizations relying on passkey-based step-up verification for critical actions may face increased risk of unauthorized access, data leakage, or misuse of AI assets. The vulnerability does not affect system integrity or availability, so it is less likely to cause service disruption or data tampering. However, the confidentiality breach could have significant operational and reputational consequences, especially for organizations handling sensitive AI workloads or intellectual property.
Mitigation Recommendations
Until a patched version is released, organizations should not rely on passkey-based step-up verification for privileged or sensitive operations in QuantumNous new-api. Instead, enforce alternative multi-factor authentication methods such as TOTP (Time-based One-Time Password) or other forms of 2FA that do not depend on the vulnerable WebAuthn flow. Temporarily restrict or disable access to endpoints protected by the affected secure-verification mechanism if operationally feasible. Implement strict monitoring and logging of authentication and authorization events to detect suspicious activities involving passkey usage. Conduct thorough account audits to identify and remediate compromised or suspicious accounts with registered passkeys. Educate users and administrators about the vulnerability and the importance of using strong, alternative authentication methods. Maintain close communication with QuantumNous for updates on patches or workarounds. Consider network segmentation and least privilege principles to limit the impact of any unauthorized access. Finally, prepare incident response plans to address potential exploitation scenarios.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, South Korea, Australia, Netherlands, Singapore
CVE-2026-32879: CWE-287: Improper Authentication in QuantumNous new-api
Description
CVE-2026-32879 is a medium-severity improper authentication vulnerability in QuantumNous new-api versions 0. 10. 0 through 0. 11. 9-alpha. 1. The flaw allows an authenticated user with a registered passkey to bypass the WebAuthn assertion step in the secure verification flow, effectively weakening the step-up authentication process. This vulnerability does not require user interaction and affects confidentiality but not integrity or availability. No patches are currently available, so organizations should avoid relying on passkey-based step-up verification for privileged actions and instead require TOTP or 2FA or restrict access to sensitive endpoints. The vulnerability impacts organizations using QuantumNous new-api, particularly those leveraging its AI asset management and LLM gateway capabilities.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-32879 is an improper authentication vulnerability (CWE-287) found in QuantumNous new-api, a platform that serves as a large language model (LLM) gateway and AI asset management system. Starting from version 0.10.0 up to 0.11.9-alpha.1, a logic flaw in the universal secure verification flow allows an authenticated user who possesses a registered passkey to bypass the required WebAuthn assertion step. Normally, WebAuthn assertions are a critical part of multi-factor or step-up authentication, ensuring that the user proves possession of a hardware or software authenticator. Due to this flaw, the system incorrectly accepts the presence of a registered passkey without verifying the actual WebAuthn assertion, effectively weakening the authentication process. This vulnerability compromises the confidentiality of privileged operations by allowing unauthorized access to secure-verification-protected endpoints without completing the full verification. The flaw does not affect integrity or availability and requires the attacker to be an authenticated user with a registered passkey, thus limiting the attack vector to insiders or compromised accounts. No patches are currently available, and the vendor has advised against relying on passkey-based step-up verification until a fix is released. Instead, organizations should enforce alternative second-factor methods such as TOTP or other 2FA mechanisms or restrict access to sensitive endpoints. The CVSS v3.1 score is 4.9 (medium), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact.
Potential Impact
The vulnerability primarily impacts the confidentiality of sensitive operations protected by step-up authentication in QuantumNous new-api. Attackers who have authenticated access with a registered passkey can bypass the WebAuthn assertion, potentially gaining unauthorized access to privileged functions or sensitive AI asset management features. This could lead to exposure of confidential AI models, data, or operational controls. Since the flaw requires prior authentication with a registered passkey, the risk is higher for insider threats or compromised accounts. The absence of a patch increases the window of exposure. Organizations relying on passkey-based step-up verification for critical actions may face increased risk of unauthorized access, data leakage, or misuse of AI assets. The vulnerability does not affect system integrity or availability, so it is less likely to cause service disruption or data tampering. However, the confidentiality breach could have significant operational and reputational consequences, especially for organizations handling sensitive AI workloads or intellectual property.
Mitigation Recommendations
Until a patched version is released, organizations should not rely on passkey-based step-up verification for privileged or sensitive operations in QuantumNous new-api. Instead, enforce alternative multi-factor authentication methods such as TOTP (Time-based One-Time Password) or other forms of 2FA that do not depend on the vulnerable WebAuthn flow. Temporarily restrict or disable access to endpoints protected by the affected secure-verification mechanism if operationally feasible. Implement strict monitoring and logging of authentication and authorization events to detect suspicious activities involving passkey usage. Conduct thorough account audits to identify and remediate compromised or suspicious accounts with registered passkeys. Educate users and administrators about the vulnerability and the importance of using strong, alternative authentication methods. Maintain close communication with QuantumNous for updates on patches or workarounds. Consider network segmentation and least privilege principles to limit the impact of any unauthorized access. Finally, prepare incident response plans to address potential exploitation scenarios.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-16T21:03:44.420Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c1986ff4197a8e3b86e7bf
Added to database: 3/23/2026, 7:45:51 PM
Last enriched: 3/30/2026, 8:34:50 PM
Last updated: 5/7/2026, 4:23:14 AM
Views: 121
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.