Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
New API: SSRF Filter Bypass via 0.0.0.0
Vulnerability Description
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. In versions 0.11.9-alpha.1 and prior, the SSRF protection introduced in v0.9.0.5 (CVE-2025-59146) and hardened in v0.9.6 (CVE-2025-62155) does not block the unspecified address 0.0.0.0. A regular (non-admin) user holding any valid API token can send a multimodal request to /v1/chat/completions, /v1/responses, or /v1/messages with 0.0.0.0 as the image/file URL host, bypassing the private-IP filter and causing the server to issue HTTP requests to localhost. This constitutes at minimum a blind SSRF; when the request is routed through an AWS/Bedrock Claude adaptor, the fetched content is inlined into the model response, upgrading it to a full-read SSRF. At time of publication, there are no publicly available patches.
CVSS Information
N/A
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
New API 代码问题漏洞
Vulnerability Description
New API是QuantumNous开源的一个接口软件。 New API 0.11.9-alpha.1及之前版本存在代码问题漏洞,该漏洞源于SSRF保护未阻止未指定地址0.0.0.0,可能导致持有有效API令牌的用户绕过私有IP过滤器向本地主机发出HTTP请求。
CVSS Information
N/A
Vulnerability Type
N/A