Impact
An insecure direct object reference flaw in the video proxy endpoint enables any authenticated user to retrieve video content belonging to other users and causes the server to authenticate to upstream AI providers with credentials derived from tasks the user does not own, potentially exposing privileged credentials and private media.
Affected Systems
QuantumNous new‑api, all releases prior to 0.11.4‑alpha.2. The vulnerability exists in the video proxy endpoint accessed with the path /v1/videos/:task_id/content.
Risk and Exploitability
The CVSS score is 6.5, indicating a moderate risk. The EPSS score is less than 1%, suggesting low probability of widespread exploitation, and the issue is not listed in CISA’s KEV catalog. The likely attack vector requires an authenticated session and an understanding of a target's task ID; the missing authorization check is simply a call to model.GetByOnlyTaskId(taskID) without a user‑id filter, allowing the data to be fetched without ownership verification.
OpenCVE Enrichment
Github GHSA