Back to list

QuantumNous/new-api has an SSRF Filter Bypass via 0.0.0.0 — CVE-2026-42339

GitHub · GitHub · CVE-2026-42339

ID
CVE-2026-42339
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
high
CVSS
7.1
EPSS
0.00038

Summary

# SSRF Filter Bypass via `0.0.0.0` ### Summary The SSRF protection introduced in v0.9.0.5 (CVE-2025-59146) and hardened in v0.9.6 (CVE-2025-62155) does not block the unspecified address `0.0.0.0`. A regular (non-admin) user holding any valid API token can send a multimodal request to `/v1/chat/completions`, `/v1/responses`, or `/v1/messages` with `0.0.0.0` as the image/file URL host, bypassing the private-IP filter…

Product

go: github.com/QuantumNous/new-api

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories