CVE-2026-25802
New API · New API LLM Gateway
A vulnerability in the New API large language model (LLM) gateway and AI asset management system could allow for unauthorized access or manipulation of AI resources.
Executive summary
The New API LLM gateway is subject to a high-severity vulnerability that could compromise artificial intelligence asset management and gateway integrity.
Vulnerability
This vulnerability affects the New API system, a gateway designed for managing LLM and AI assets. While the specific vulnerability type is not detailed, the high CVSS score suggests a critical failure in access control or input handling within the API management layer.
Business impact
A successful exploit could lead to the unauthorized use of expensive AI model credits, leakage of sensitive training data, or the redirection of LLM traffic to malicious endpoints. With a CVSS score of 7.6, the severity is classified as High, reflecting a significant risk to the confidentiality and integrity of an organization’s AI infrastructure and associated data assets.
Remediation
Immediate Action: Administrators should apply the latest security updates provided by the New API project maintainers immediately to secure the gateway.
Proactive Monitoring: Implement rigorous logging of API requests and monitor for unusual spikes in LLM token usage or unauthorized IP addresses accessing the management console.
Compensating Controls: Deploy a Web Application Firewall (WAF) to filter incoming traffic to the gateway and restrict access to the management interface using IP allowlisting.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The high CVSS score and the critical role that LLM gateways play in modern infrastructure necessitate immediate action. Organizations utilizing New API must prioritize the application of vendor-provided patches. Failure to remediate this flaw could result in significant financial loss through resource theft or the exposure of proprietary AI workflows.