Medium severity5.8NVD Advisory· Published Apr 6, 2026· Updated Apr 27, 2026
CVE-2026-34981
CVE-2026-34981
Description
The whisperX API is a tool for enhancing and analyzing audio content. From 0.3.1 to 0.5.0, FileService.download_from_url() in app/services/file_service.py calls requests.get(url) with zero URL validation. The file extension check occurs AFTER the HTTP request is already made, and can be bypassed by appending .mp3 to any internal URL. The /speech-to-text-url endpoint is unauthenticated. This vulnerability is fixed in 0.6.0.
Affected products
1- cpe:2.3:a:pavelzbornik:whisperx_rest_api:*:*:*:*:*:*:*:*Range: >=0.3.1,<0.6.0
Patches
1ef78fe2001deVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3- github.com/pavelzbornik/whisperX-FastAPI/commit/ef78fe2001deede5354031e4200d41c6a7e8cbfcnvdPatch
- github.com/pavelzbornik/whisperX-FastAPI/issues/256nvdIssue TrackingPatch
- github.com/pavelzbornik/whisperX-FastAPI/security/advisories/GHSA-6rc7-r867-c635nvdThird Party AdvisoryExploitMitigation
News mentions
0No linked articles in our index yet.