Description
A security vulnerability has been detected in QuantumNous new-api up to 0.12.1. This affects the function RelayMidjourneyImage/GetByOnlyMJId of the file router/relay-router.go of the component Midjourney Image Relay Endpoint. Such manipulation leads to authorization bypass. The attack can be launched remotely. The attack requires a high level of complexity. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
0.12.1
Timeline
| 2026-05-22: | Advisory disclosed |
| 2026-05-22: | VulDB entry created |
| 2026-05-22: | VulDB entry last update |
Credits
Eric-e (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/365253 (VDB-365253 | QuantumNous new-api Midjourney Image Relay Endpoint relay-router.go GetByOnlyMJId authorization)
vuldb.com/vuln/365253/cti (VDB-365253 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/812196 (Submit #812196 | QuantumNous new-api 0.12.1 Authorization Bypass Through User-Controlled Key (CWE-639))
gist.github.com/YLChen-007/13974ead25fc6dac42fd7bac62fbb2df