Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/QuantumNous/new-api
  4. ›
  5. CVE-2026-41432

CVE-2026-41432: New API: Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud

April 24, 2026

A critical vulnerability exists in the Stripe webhook handler that allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without making any payment. The vulnerability stems from three compounding flaws:

  1. The Stripe webhook endpoint does not reject requests when StripeWebhookSecret is empty (the default).
  2. When the HMAC secret is empty, any attacker can compute valid webhook signatures, effectively bypassing signature verification entirely.
  3. The Recharge function does not validate that the order’s PaymentMethod matches the callback source, enabling cross-gateway exploitation — an order created via any payment method (e.g., Epay) can be fulfilled through a forged Stripe webhook.

References

  • docs.stripe.com/checkout/fulfillment
  • docs.stripe.com/webhooks
  • github.com/QuantumNous/new-api
  • github.com/QuantumNous/new-api/releases/tag/v0.12.10
  • github.com/QuantumNous/new-api/security/advisories/GHSA-xff3-5c9p-2mr4
  • github.com/advisories/GHSA-xff3-5c9p-2mr4
  • nvd.nist.gov/vuln/detail/CVE-2026-41432

Code Behaviors & Features

Detect and mitigate CVE-2026-41432 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.12.10

Fixed versions

  • 0.12.10

Solution

Upgrade to version 0.12.10 or above.

Impact 7.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-1188: Initialization of a Resource with an Insecure Default
  • CWE-345: Insufficient Verification of Data Authenticity
  • CWE-863: Incorrect Authorization

Source file

go/github.com/QuantumNous/new-api/CVE-2026-41432.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 25 Apr 2026 00:19:01 +0000.