{"api_version":"1","generated_at":"2026-05-09T11:18:29+00:00","cve":"CVE-2026-41432","urls":{"html":"https://cve.report/CVE-2026-41432","api":"https://cve.report/api/cve/CVE-2026-41432.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-41432","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-41432"},"summary":{"title":"New API: Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud","description":"New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.12.10, a vulnerability exists in the Stripe webhook handler that allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without making any payment. This issue has been patched in version 0.12.10.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-08 23:16:35","updated_at":"2026-05-08 23:16:35"},"problem_types":["CWE-345","CWE-863","CWE-1188","CWE-345 CWE-345: Insufficient Verification of Data Authenticity","CWE-1188 CWE-1188: Insecure Default Initialization of Resource","CWE-863 CWE-863: Incorrect Authorization"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"7.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L","version":"3.1"}}],"references":[{"url":"https://github.com/QuantumNous/new-api/releases/tag/v0.12.10","name":"https://github.com/QuantumNous/new-api/releases/tag/v0.12.10","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/QuantumNous/new-api/security/advisories/GHSA-xff3-5c9p-2mr4","name":"https://github.com/QuantumNous/new-api/security/advisories/GHSA-xff3-5c9p-2mr4","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-41432","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-41432","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"QuantumNous","product":"new-api","version":"affected < 0.12.10","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"new-api","vendor":"QuantumNous","versions":[{"status":"affected","version":"< 0.12.10"}]}],"descriptions":[{"lang":"en","value":"New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.12.10, a vulnerability exists in the Stripe webhook handler that allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without making any payment. This issue has been patched in version 0.12.10."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-345","description":"CWE-345: Insufficient Verification of Data Authenticity","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-1188","description":"CWE-1188: Insecure Default Initialization of Resource","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-863","description":"CWE-863: Incorrect Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-08T22:21:32.305Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/QuantumNous/new-api/security/advisories/GHSA-xff3-5c9p-2mr4","tags":["x_refsource_CONFIRM"],"url":"https://github.com/QuantumNous/new-api/security/advisories/GHSA-xff3-5c9p-2mr4"},{"name":"https://github.com/QuantumNous/new-api/releases/tag/v0.12.10","tags":["x_refsource_MISC"],"url":"https://github.com/QuantumNous/new-api/releases/tag/v0.12.10"}],"source":{"advisory":"GHSA-xff3-5c9p-2mr4","discovery":"UNKNOWN"},"title":"New API: Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-41432","datePublished":"2026-05-08T22:21:32.305Z","dateReserved":"2026-04-20T15:32:33.814Z","dateUpdated":"2026-05-08T22:21:32.305Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 23:16:35","lastModifiedDate":"2026-05-08 23:16:35","problem_types":["CWE-345","CWE-863","CWE-1188","CWE-345 CWE-345: Insufficient Verification of Data Authenticity","CWE-1188 CWE-1188: Insecure Default Initialization of Resource","CWE-863 CWE-863: Incorrect Authorization"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":4.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"41432","Ordinal":"1","Title":"New API: Stripe Webhook Signature Bypass via Empty Secret Enable","CVE":"CVE-2026-41432","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"41432","Ordinal":"1","NoteData":"New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.12.10, a vulnerability exists in the Stripe webhook handler that allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without making any payment. This issue has been patched in version 0.12.10.","Type":"Description","Title":"New API: Stripe Webhook Signature Bypass via Empty Secret Enable"}]}}}