CVE-2026-34981

The whisperX API is a tool for enhancing and analyzing audio content. From 0.3.1 to 0.5.0, FileService.download_from_url() in app/services/file_service.py calls requests.get(url) with zero URL validation. The file extension check occurs AFTER the HTTP request is already made, and can be bypassed by appending .mp3 to any internal URL. The /speech-to-text-url endpoint is unauthenticated. This vulnerability is fixed in 0.6.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pavelzbornik:whisperx_rest_api:*:*:*:*:*:*:*:*

History

27 Apr 2026, 14:44

Type Values Removed Values Added
CPE cpe:2.3:a:pavelzbornik:whisperx_rest_api:*:*:*:*:*:*:*:*
First Time Pavelzbornik whisperx Rest Api
Pavelzbornik
References () https://github.com/pavelzbornik/whisperX-FastAPI/commit/ef78fe2001deede5354031e4200d41c6a7e8cbfc - () https://github.com/pavelzbornik/whisperX-FastAPI/commit/ef78fe2001deede5354031e4200d41c6a7e8cbfc - Patch
References () https://github.com/pavelzbornik/whisperX-FastAPI/issues/256 - () https://github.com/pavelzbornik/whisperX-FastAPI/issues/256 - Issue Tracking, Patch
References () https://github.com/pavelzbornik/whisperX-FastAPI/security/advisories/GHSA-6rc7-r867-c635 - () https://github.com/pavelzbornik/whisperX-FastAPI/security/advisories/GHSA-6rc7-r867-c635 - Third Party Advisory, Exploit, Mitigation

06 Apr 2026, 17:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 17:17

Updated : 2026-04-27 14:44


NVD link : CVE-2026-34981

Mitre link : CVE-2026-34981

CVE.ORG link : CVE-2026-34981


JSON object : View

Products Affected

pavelzbornik

  • whisperx_rest_api
CWE
CWE-918

Server-Side Request Forgery (SSRF)