Description
A weakness has been identified in QuantumNous new-api up to 0.12.1. The impacted element is the function SearchUserTopUps/SearchAllTopUps of the file model/topup.go of the component self Endpoint. This manipulation causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
0.12.1
Timeline
| 2026-05-22: | Advisory disclosed |
| 2026-05-22: | VulDB entry created |
| 2026-05-22: | VulDB entry last update |
Credits
Eric-e (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/365252 (VDB-365252 | QuantumNous new-api self Endpoint topup.go SearchAllTopUps sql injection)
vuldb.com/vuln/365252/cti (VDB-365252 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/812192 (Submit #812192 | QuantumNous new-api [Needs Manual Input] SQL Injection (CWE-89))
vuldb.com/submit/812195 (Submit #812195 | QuantumNous new-api 0.12.1 Improper Neutralization of Data Query Logic (CWE-943) (Duplicate))
gist.github.com/YLChen-007/cf501d0a66c81298b2f97e854f3813db