PipesHub is a fully extensible workplace AI platform for enterprise search and workflow automation. Versions prior to 0.1.0-beta expose POST /api/v1/record/buffer/convert through missing authentication. The endpoint accepts a file upload and converts it to PDF via LibreOffice by uploading payload to os.path.join(tmpdir, file.filename) without normalizing the filename. An attacker can submit a crafted filename containing ../ sequences to write arbitrary files anywhere the service account has permission, enabling remote file overwrite or planting malicious code. This issue is fixed in version 0.1.0-beta.
References
| Link | Resource |
|---|---|
| https://github.com/pipeshub-ai/pipeshub-ai/commit/987ebab40a1fc39956730ed93220f7f9b2c4e5f8 | Patch |
| https://github.com/pipeshub-ai/pipeshub-ai/security/advisories/GHSA-w398-9m55-2357 | Exploit Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Mar 2026, 20:31
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pipeshub
Pipeshub pipeshub |
|
| CPE | cpe:2.3:a:pipeshub:pipeshub:0.1.3:alpha:*:*:*:*:*:* cpe:2.3:a:pipeshub:pipeshub:0.1.0:alpha:*:*:*:*:*:* cpe:2.3:a:pipeshub:pipeshub:0.1.2:alpha:*:*:*:*:*:* |
|
| References | () https://github.com/pipeshub-ai/pipeshub-ai/commit/987ebab40a1fc39956730ed93220f7f9b2c4e5f8 - Patch | |
| References | () https://github.com/pipeshub-ai/pipeshub-ai/security/advisories/GHSA-w398-9m55-2357 - Exploit, Mitigation, Vendor Advisory |
10 Dec 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 01:15
Updated : 2026-03-17 20:31
NVD link : CVE-2025-67506
Mitre link : CVE-2025-67506
CVE.ORG link : CVE-2025-67506
JSON object : View
Products Affected
pipeshub
- pipeshub
