<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>QuantumNous — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/quantumnous/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/quantumnous/feed.xml" rel="self" type="application/rss+xml"/><item><title>QuantumNous new-api SSRF Bypass via 0.0.0.0</title><link>https://feed.craftedsignal.io/briefs/2026-05-quantum-nous-ssrf/</link><pubDate>Thu, 07 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-quantum-nous-ssrf/</guid><description>The QuantumNous new-api is vulnerable to SSRF attacks. The SSRF protection implemented in versions v0.9.0.5 (CVE-2025-59146) and v0.9.6 (CVE-2025-62155) can be bypassed by using the address `0.0.0.0`. An attacker with a valid API token can send a request to `/v1/chat/completions`, `/v1/responses`, or `/v1/messages` with `0.0.0.0` as the image/file URL host, which bypasses the private-IP filter and allows the server to issue HTTP requests to localhost, enabling a blind SSRF and possibly a full-read SSRF in specific configurations.</description><content:encoded><![CDATA[<p>The QuantumNous new-api is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability due to an incomplete fix for previous SSRF issues (CVE-2025-59146, CVE-2025-62155). The vulnerability exists in versions up to 0.11.9-alpha.1. The SSRF protection implemented in v0.9.0.5 and hardened in v0.9.6 fails to block the address <code>0.0.0.0</code>, which resolves to localhost on Linux systems. An authenticated, regular user with any valid API token can exploit this by sending a request to specific endpoints such as <code>/v1/chat/completions</code> including <code>0.0.0.0</code> in the URL of an image or file. If the request is routed through an AWS/Bedrock Claude adaptor, this can be upgraded to a full-read SSRF where the fetched content is inlined into the model response, allowing for exfiltration of internal content.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains a valid API token for a regular user account on the QuantumNous new-api.</li>
<li>The attacker crafts a POST request to <code>/v1/chat/completions</code> with a JSON payload that includes a malicious <code>image_url</code> with the host set to <code>0.0.0.0</code> and a port in the allowed list (80, 443, 8080, 8443). For example: <code>&quot;url&quot;: &quot;http://0.0.0.0:8080/probe.png&quot;</code>. The <code>stream: true</code> parameter is also set to trigger the fetch path.</li>
<li>The server-side code at <code>dto/openai_request.go</code> recognizes the <code>http(s)://</code> URL as a valid source and proceeds to collect metadata.</li>
<li>The <code>LoadFileSource()</code> function at <code>service/token_counter.go</code> determines that the file needs to be fetched based on the <code>shouldFetchFiles</code> setting.</li>
<li>The <code>loadFromURL()</code> function within <code>service/file_service.go</code> calls <code>DoDownloadRequest()</code>.</li>
<li>The <code>ValidateURLWithFetchSetting()</code> function at <code>service/download.go</code> incorrectly validates the URL, as <code>0.0.0.0</code> is not blocked by the IP filter.</li>
<li>The server initiates a TCP connection to <code>0.0.0.0</code> on the specified port.</li>
<li>If the request is routed through an AWS/Bedrock Claude channel, the fetched content from <code>0.0.0.0</code> is then inlined into the model request and leaked through the model&rsquo;s response (full-read SSRF). Otherwise, an attacker can probe internal services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>An attacker with a valid user API token can exploit this SSRF vulnerability to probe internal services and potentially exfiltrate sensitive information. By bypassing the intended SSRF protections, the attacker can access resources on the localhost that should not be exposed. If the request is processed by a multimodal model like Claude via AWS/Bedrock, the fetched content can be directly leaked through the model&rsquo;s output, leading to full-read SSRF. The vulnerability can be exploited by any registered user since user registration is often enabled by default.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply a patch that adds <code>0.0.0.0/8</code> to the deny list in <code>isPrivateIP()</code> as suggested in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect QuantumNous new-api SSRF Attempt via 0.0.0.0&rdquo; to detect attempts to exploit this vulnerability by monitoring network connections to 0.0.0.0.</li>
<li>Block the URLs <code>http://0.0.0.0:8080/probe.png</code> and <code>https://dummyimage.com/600x180/111/fff.png&amp;text=READBACK-OK-314159</code> at the network perimeter to prevent exploitation.</li>
<li>Upgrade to a version of the QuantumNous new-api that includes a fix for CVE-2026-42339.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>quantumnous</category></item></channel></rss>