New API has passkey-based secure step-up verification bypass for root-only channel secret disclosure
Description
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Starting in version 0.10.0, a logic flaw in the universal secure verification flow allows an authenticated user with a registered passkey to satisfy secure verification without completing a WebAuthn assertion. As of time of publication, no known patched versions are available. Until a patched release is applied, do not rely on passkey as the step-up method for privileged secure-verification actions; require TOTP/2FA for those actions where operationally possible; or temporarily restrict access to affected secure-verification-protected endpoints.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated users with a registered passkey can bypass WebAuthn assertion to satisfy secure verification in New API, compromising protected endpoints like channel secret retrieval.
A logic flaw exists in the universal secure verification flow of New API, an LLM gateway and AI asset management system, starting from version 0.10.0. The vulnerability lies in the POST /api/verify endpoint, which supports multiple secure verification methods including passkeys. When a request body contains {"method":"passkey"}, the server only checks whether the authenticated account has a passkey record on file and then marks the secure verification session as complete. It does not verify that the requester successfully completed a WebAuthn assertion, thus failing to enforce proper authentication for step-up verification [1][2].
The attack surface is limited to authenticated users who already have a valid session and a registered passkey on their account. The attacker can satisfy the secure verification requirement without performing the intended passkey challenge/response flow, defeating the step-up control for actions protected by `SecureVerificationRequired[] [2]. No full login bypass or cross-account escalation is indicated, but the issue directly impacts privileged endpoints such as the root-only POST /api/channel/:id/key, which returns stored channel secrets [2].
Successful exploitation allows an authenticated user to bypass the intended step-up verification and gain access to sensitive operations that should require stronger authentication. In the upstream project, the primary impact is confirmed for the channel secret disclosure endpoint, where an attacker could retrieve stored secrets without completing the required assertion [2].
As of publication, no patched version has been released [2]. Workarounds include avoiding reliance on passkey as the step-up method for privileged secure-verification actions, requiring TOTP/2FA for those actions where operationally possible, or temporarily restricting access to affected endpoints protected secure verification [2].
- GitHub - QuantumNous/new-api: A unified AI model hub for aggregation & distribution. It supports cross-converting various LLMs into OpenAI-compatible, Claude-compatible, or Gemini-compatible formats. A centralized gateway for personal and enterprise model management. 🍥
- Passkey-based secure step-up verification bypass for root-only channel secret disclosure
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/QuantumNous/new-apiGo | >= 0.10.0, <= 0.11.9-alpha.1 | — |
Affected products
1- QuantumNous/new-apiv5Range: >= 0.10.0, <= 0.11.9-alpha.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/advisories/GHSA-5353-f8fq-65vcghsaADVISORY
- github.com/QuantumNous/new-api/security/advisories/GHSA-5353-f8fq-65vcghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.