Home

Description

The whisperX API is a tool for enhancing and analyzing audio content. From 0.3.1 to 0.5.0, FileService.download_from_url() in app/services/file_service.py calls requests.get(url) with zero URL validation. The file extension check occurs AFTER the HTTP request is already made, and can be bypassed by appending .mp3 to any internal URL. The /speech-to-text-url endpoint is unauthenticated. This vulnerability is fixed in 0.6.0.

PUBLISHED Reserved 2026-03-31 | Published 2026-04-06 | Updated 2026-04-06 | Assigner GitHub_M




MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

>= 0.3.1, < 0.6.0
affected

References

github.com/...astAPI/security/advisories/GHSA-6rc7-r867-c635

github.com/pavelzbornik/whisperX-FastAPI/issues/256

github.com/...ommit/ef78fe2001deede5354031e4200d41c6a7e8cbfc

cve.org (CVE-2026-34981)

nvd.nist.gov (CVE-2026-34981)

Download JSON