CVE-2026-30886: AI component: IDOR enables unauthorized data access
MEDIUM PoC AVAILABLE CISA: TRACK*CVE-2026-30886 is an IDOR in New API, a popular open-source LLM gateway, allowing any authenticated user to access other users' AI-generated video content AND trigger upstream API calls (Google Gemini, OpenAI) billed against victim users' credentials. The credential abuse vector elevates practical risk beyond the 6.5 CVSS — an attacker can drain competitors' API quotas or access sensitive AI outputs. Patch to 0.11.4-alpha.2 immediately; if delayed, restrict the `/v1/videos/:task_id/content` endpoint to authorized roles at the network layer.
Risk Assessment
Practical risk is elevated above the Medium CVSS rating due to the dual-impact nature: data confidentiality breach plus unauthorized consumption of third-party AI provider credentials. Exploitability is trivial — low privilege, no user interaction, sequential task ID enumeration or blind guessing is sufficient. Exposure is scoped to organizations self-hosting New API as their LLM gateway, which is common in enterprises managing multi-provider AI access centrally. No public exploit code observed at time of analysis, but the vulnerability is trivially reproducible from the advisory.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch
Upgrade New API to version 0.11.4-alpha.2 immediately.
-
If unable to patch
Apply WAF rule or reverse proxy ACL blocking unauthenticated or cross-user access to
GET /v1/videos/:task_id/content; enforce session-bound task ID validation at the gateway layer. -
Audit
Review access logs for the affected endpoint for anomalous cross-user task ID access patterns (user A accessing task IDs that don't correlate with their session history).
-
Credential rotation
If exploitation is suspected, rotate all upstream AI provider API keys (OpenAI, Google Gemini) configured in New API.
-
Code review
Audit all other task-lookup endpoints in New API for similar missing
user_idfilter patterns — the advisory notes this is the only instance, but verify independently. -
Detection
Alert on task ID enumeration patterns (sequential or high-volume requests to the video endpoint from a single authenticated user).
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-30886?
CVE-2026-30886 is an IDOR in New API, a popular open-source LLM gateway, allowing any authenticated user to access other users' AI-generated video content AND trigger upstream API calls (Google Gemini, OpenAI) billed against victim users' credentials. The credential abuse vector elevates practical risk beyond the 6.5 CVSS — an attacker can drain competitors' API quotas or access sensitive AI outputs. Patch to 0.11.4-alpha.2 immediately; if delayed, restrict the `/v1/videos/:task_id/content` endpoint to authorized roles at the network layer.
Is CVE-2026-30886 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2026-30886, increasing the risk of exploitation.
How to fix CVE-2026-30886?
1. **Patch**: Upgrade New API to version 0.11.4-alpha.2 immediately. 2. **If unable to patch**: Apply WAF rule or reverse proxy ACL blocking unauthenticated or cross-user access to `GET /v1/videos/:task_id/content`; enforce session-bound task ID validation at the gateway layer. 3. **Audit**: Review access logs for the affected endpoint for anomalous cross-user task ID access patterns (user A accessing task IDs that don't correlate with their session history). 4. **Credential rotation**: If exploitation is suspected, rotate all upstream AI provider API keys (OpenAI, Google Gemini) configured in New API. 5. **Code review**: Audit all other task-lookup endpoints in New API for similar missing `user_id` filter patterns — the advisory notes this is the only instance, but verify independently. 6. **Detection**: Alert on task ID enumeration patterns (sequential or high-volume requests to the video endpoint from a single authenticated user).
What systems are affected by CVE-2026-30886?
This vulnerability affects the following AI/ML architecture patterns: LLM API gateways, Multi-tenant AI platforms, AI asset management systems, Model serving infrastructure, Multi-provider AI orchestration.
What is the CVSS score for CVE-2026-30886?
CVE-2026-30886 has a CVSS v3.1 base score of 6.5 (MEDIUM). The EPSS exploitation probability is 0.04%.
Technical Details
NVD Description
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.11.4-alpha.2, an Insecure Direct Object Reference (IDOR) vulnerability in the video proxy endpoint (`GET /v1/videos/:task_id/content`) allows any authenticated user to access video content belonging to other users and causes the server to authenticate to upstream AI providers (Google Gemini, OpenAI) using credentials derived from tasks they do not own. The missing authorization check is a single function call — `model.GetByOnlyTaskId(taskID)` queries by `task_id` alone with no `user_id` filter, while every other task-lookup in the codebase enforces ownership via `model.GetByTaskId(userId, taskID)`. Version 0.11.4-alpha.2 contains a patch.
Exploitation Scenario
An adversary registers a legitimate account on a shared New API instance (e.g., a corporate LLM gateway or a cloud-hosted multi-tenant deployment). They submit a valid request to generate a video task to obtain a sample `task_id` format. They then enumerate sequential or UUID-range task IDs against `GET /v1/videos/:task_id/content` using their valid session token. For each valid task ID belonging to another user, the server resolves the task without ownership checks, returns the video content, and — critically — authenticates to Google Gemini or OpenAI using the credential associated with the task owner. The adversary can now: (a) exfiltrate other users' AI-generated content, (b) repeatedly trigger expensive AI inference calls charged to victims' API keys, burning their quotas or incurring financial harm, and (c) potentially infer proprietary prompt structures from the content of other users' AI outputs.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same attack type: Code Execution CVE-2024-2912 10.0 BentoML: RCE via insecure deserialization (CVSS 10)
Same attack type: Code Execution CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Data Leakage CVE-2025-5120 10.0 smolagents: sandbox escape enables unauthenticated RCE
Same attack type: Data Leakage CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same attack type: Code Execution
AI Threat Alert