The whisperX API is a tool for enhancing and analyzing audio content. From 0.3.1 to 0.5.0, FileService.download_from_url() in app/services/file_service.py calls requests.get(url) with zero URL validation. The file extension check occurs AFTER the HTTP request is already made, and can be bypassed by appending .mp3 to any internal URL. The /speech-to-text-url endpoint is unauthenticated. This vulnerability is fixed in 0.6.0.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The whisperX API is a tool for enhancing and analyzing audio content. From 0.3.1 to 0.5.0, FileService.download_from_url() in app/services/file_service.py calls requests.get(url) with zero URL validation. The file extension check occurs AFTER the HTTP request is already made, and can be bypassed by appending .mp3 to any internal URL. The /speech-to-text-url endpoint is unauthenticated. This vulnerability is fixed in 0.6.0. | |
| Title | whisperX REST API: SSRF in download_from_url() — URL validation happens after HTTP request, extension bypass via .mp3 | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T18:45:41.844Z
Reserved: 2026-03-31T19:38:31.617Z
Link: CVE-2026-34981
No data.
Status : Received
Published: 2026-04-06T17:17:11.710
Modified: 2026-04-06T17:17:11.710
Link: CVE-2026-34981
No data.
OpenCVE Enrichment
No data.