VYPR
Moderate severityNVD Advisory· Published Mar 23, 2026· Updated Mar 24, 2026

New API has passkey-based secure step-up verification bypass for root-only channel secret disclosure

CVE-2026-32879

Description

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Starting in version 0.10.0, a logic flaw in the universal secure verification flow allows an authenticated user with a registered passkey to satisfy secure verification without completing a WebAuthn assertion. As of time of publication, no known patched versions are available. Until a patched release is applied, do not rely on passkey as the step-up method for privileged secure-verification actions; require TOTP/2FA for those actions where operationally possible; or temporarily restrict access to affected secure-verification-protected endpoints.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated users with a registered passkey can bypass WebAuthn assertion to satisfy secure verification in New API, compromising protected endpoints like channel secret retrieval.

A logic flaw exists in the universal secure verification flow of New API, an LLM gateway and AI asset management system, starting from version 0.10.0. The vulnerability lies in the POST /api/verify endpoint, which supports multiple secure verification methods including passkeys. When a request body contains {"method":"passkey"}, the server only checks whether the authenticated account has a passkey record on file and then marks the secure verification session as complete. It does not verify that the requester successfully completed a WebAuthn assertion, thus failing to enforce proper authentication for step-up verification [1][2].

The attack surface is limited to authenticated users who already have a valid session and a registered passkey on their account. The attacker can satisfy the secure verification requirement without performing the intended passkey challenge/response flow, defeating the step-up control for actions protected by `SecureVerificationRequired[] [2]. No full login bypass or cross-account escalation is indicated, but the issue directly impacts privileged endpoints such as the root-only POST /api/channel/:id/key, which returns stored channel secrets [2].

Successful exploitation allows an authenticated user to bypass the intended step-up verification and gain access to sensitive operations that should require stronger authentication. In the upstream project, the primary impact is confirmed for the channel secret disclosure endpoint, where an attacker could retrieve stored secrets without completing the required assertion [2].

As of publication, no patched version has been released [2]. Workarounds include avoiding reliance on passkey as the step-up method for privileged secure-verification actions, requiring TOTP/2FA for those actions where operationally possible, or temporarily restricting access to affected endpoints protected secure verification [2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/QuantumNous/new-apiGo
>= 0.10.0, <= 0.11.9-alpha.1

Affected products

1
  • QuantumNous/new-apiv5
    Range: >= 0.10.0, <= 0.11.9-alpha.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.