CVE-2026-30886: Insecure Direct Object Reference in QuantumNous New API Video Proxy
Vulnerability ID: CVE-2026-30886
CVSS Score: 6.5
Published: 2026-03-23
CVE-2026-30886 is an Insecure Direct Object Reference (IDOR) vulnerability in the QuantumNous new-api LLM gateway. Affecting versions prior to 0.11.4-alpha.2, the flaw allows authenticated users to access arbitrary video proxy tasks via a missing authorization check, leading to unauthorized data access and AI provider quota consumption.
TL;DR
An IDOR in QuantumNous new-api allows authenticated users to access other users' video proxy tasks, exposing private content and consuming victim AI quotas.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-639
- Attack Vector: Network
- CVSS Base Score: 6.5
- Exploit Status: Proof-of-Concept
- CISA KEV Listed: False
- Impact: Confidentiality (High)
Affected Systems
- QuantumNous new-api
-
new-api: < 0.11.4-alpha.2 (Fixed in:
0.11.4-alpha.2)
Code Analysis
Commit: 50ec2ba
Fix task authorization check in video proxy controller
@@ -35,7 +35,8 @@ func VideoProxy(c *gin.Context) {
return
}
- task, exists, err := model.GetByOnlyTaskId(taskID)
+ userID := c.GetInt("id")
+ task, exists, err := model.GetByTaskId(userID, taskID)
if err != nil {
logger.LogError(c.Request.Context(), fmt.Sprintf("Failed to query task %s: %s", taskID, err.Error()))
Mitigation Strategies
- Upgrade to new-api version 0.11.4-alpha.2
- Manually backport commit 50ec2bac6b341e651fc9ac4344e3bd2cdaeafdbd
- Implement high-entropy identifiers (UUIDs) for task indexing
- Audit codebase for other uses of model.GetByOnlyTaskId
Remediation Steps:
- Review current deployment version of new-api.
- If vulnerable, schedule a maintenance window to apply the update.
- Deploy the 0.11.4-alpha.2 binary or container image.
- Verify functionality of the
/v1/videos/:task_id/contentendpoint. - Review access logs for signs of sequential ID polling to identify potential past exploitation.
References
Read the full report for CVE-2026-30886 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)