{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T18:35:06.153","vulnerabilities":[{"cve":{"id":"CVE-2026-30886","sourceIdentifier":"security-advisories@github.com","published":"2026-03-23T20:16:25.963","lastModified":"2026-03-25T17:53:53.027","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.11.4-alpha.2, an Insecure Direct Object Reference (IDOR) vulnerability in the video proxy endpoint (`GET /v1/videos/:task_id/content`) allows any authenticated user to access video content belonging to other users and causes the server to authenticate to upstream AI providers (Google Gemini, OpenAI) using credentials derived from tasks they do not own. The missing authorization check is a single function call — `model.GetByOnlyTaskId(taskID)` queries by `task_id` alone with no `user_id` filter, while every other task-lookup in the codebase enforces ownership via `model.GetByTaskId(userId, taskID)`. Version 0.11.4-alpha.2 contains a patch."},{"lang":"es","value":"Nueva API es una pasarela de modelo de lenguaje grande (LLM) y un sistema de gestión de activos de inteligencia artificial (IA). Antes de la versión 0.11.4-alpha.2, una vulnerabilidad de Referencia Directa Insegura a Objeto (IDOR) en el endpoint de proxy de video ('GET /v1/videos/:task_id/content') permite a cualquier usuario autenticado acceder a contenido de video perteneciente a otros usuarios y hace que el servidor se autentique con proveedores de IA ascendentes (Google Gemini, OpenAI) utilizando credenciales derivadas de tareas que no poseen. La comprobación de autorización faltante es una única llamada a función — 'model.GetByOnlyTaskId(taskID)' consulta solo por 'task_id' sin filtro de 'user_id', mientras que cada otra búsqueda de tarea en la base de código impone la propiedad a través de 'model.GetByTaskId(userId, taskID)'. La versión 0.11.4-alpha.2 contiene un parche."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:newapi:new_api:*:*:*:*:*:*:*:*","versionEndExcluding":"0.11.4","matchCriteriaId":"588761F3-632A-4CE6-B80E-7D3D772677B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:newapi:new_api:0.11.4:alpha1:*:*:*:*:*:*","matchCriteriaId":"E89C616C-399A-4CE2-899E-31C9ED588FFD"}]}]}],"references":[{"url":"https://github.com/QuantumNous/new-api/commit/50ec2bac6b341e651fc9ac4344e3bd2cdaeafdbd","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/QuantumNous/new-api/security/advisories/GHSA-f35r-v9x5-r8mc","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]}]}}]}