Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5353-f8fq-65vc | New API has passkey-based secure step-up verification bypass for root-only channel secret disclosure |
Wed, 25 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Newapi
Newapi new Api |
|
| CPEs | cpe:2.3:a:newapi:new_api:*:*:*:*:*:*:*:* cpe:2.3:a:newapi:new_api:0.11.9:alpha1:*:*:*:*:*:* |
|
| Vendors & Products |
Newapi
Newapi new Api |
Tue, 24 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Quantumnous
Quantumnous new-api |
|
| Vendors & Products |
Quantumnous
Quantumnous new-api |
Mon, 23 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Starting in version 0.10.0, a logic flaw in the universal secure verification flow allows an authenticated user with a registered passkey to satisfy secure verification without completing a WebAuthn assertion. As of time of publication, no known patched versions are available. Until a patched release is applied, do not rely on passkey as the step-up method for privileged secure-verification actions; require TOTP/2FA for those actions where operationally possible; or temporarily restrict access to affected secure-verification-protected endpoints. | |
| Title | New API has passkey-based secure step-up verification bypass for root-only channel secret disclosure | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T15:13:22.246Z
Reserved: 2026-03-16T21:03:44.420Z
Link: CVE-2026-32879
Updated: 2026-03-24T14:43:22.766Z
Status : Analyzed
Published: 2026-03-23T20:16:27.373
Modified: 2026-03-25T17:52:28.520
Link: CVE-2026-32879
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:36:49Z
Github GHSA