CVE-2026-27897: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WanderingAstronomer Vociferous
Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by the backends filesystem logic. Because the API is unauthenticated and the CORS configuration in app.py is overly permissive (allow_origins=["*"] or allowing localhost), an external attacker can bypass the UI entirely. By using directory traversal sequences (../), an attacker can force the app to write arbitrary data to any location accessible by the current user's permissions. This vulnerability is fixed in 4.4.2.
AI Analysis
Technical Summary
The vulnerability CVE-2026-27897 affects WanderingAstronomer's Vociferous speech-to-text software in versions prior to 4.4.2. The issue lies in the export_file route implemented in src/api/system.py, which processes a JSON payload containing a filename and content to write files locally. The developer intended for file paths to be controlled via a native UI dialog, but the API itself does not validate or sanitize the filename parameter. This lack of validation allows an attacker to include directory traversal sequences (e.g., '../') in the filename, enabling arbitrary file writes outside the intended directory. Compounding the risk, the API is unauthenticated, and the CORS policy in app.py is overly permissive, allowing any origin or localhost, which enables remote attackers to bypass the UI and invoke the vulnerable API directly. Successful exploitation can lead to arbitrary file creation or modification with the privileges of the user running the application, potentially allowing attackers to overwrite critical system or application files, inject malicious code, or disrupt service availability. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-306 (Missing Authentication for Critical Function). The CVSS v3.1 base score is 10.0, reflecting network attack vector, no required privileges or user interaction, and complete compromise of confidentiality, integrity, and availability. The issue was publicly disclosed on March 11, 2026, and fixed in Vociferous version 4.4.2.
Potential Impact
This vulnerability poses a severe risk to organizations using Vociferous versions prior to 4.4.2. Exploitation allows remote, unauthenticated attackers to write arbitrary files anywhere on the filesystem accessible to the application user. This can lead to complete system compromise, including data theft, unauthorized code execution, persistent backdoors, and denial of service by overwriting critical files. Because the API is exposed with permissive CORS settings, attackers can exploit this from remote web origins, increasing the attack surface. Organizations relying on Vociferous for speech-to-text processing, especially in sensitive environments, face risks of intellectual property theft, operational disruption, and potential lateral movement within networks if the compromised host is part of a larger infrastructure. The critical severity and ease of exploitation make this a high-priority issue for immediate remediation.
Mitigation Recommendations
1. Upgrade Vociferous to version 4.4.2 or later, where this vulnerability is patched. 2. If upgrading immediately is not possible, restrict network access to the export_file API endpoint by implementing firewall rules or network segmentation to limit exposure. 3. Harden CORS policies by configuring app.py to allow only trusted origins instead of wildcard or localhost. 4. Implement additional input validation and sanitization on the filename parameter to reject directory traversal sequences and enforce strict path constraints. 5. Introduce authentication and authorization controls on the API endpoints to prevent unauthenticated access. 6. Monitor logs for suspicious file write activities or unexpected API calls. 7. Conduct regular security audits and penetration testing focused on API endpoints and file handling logic. 8. Educate developers on secure coding practices related to file system access and API security.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, Netherlands, Sweden
CVE-2026-27897: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WanderingAstronomer Vociferous
Description
Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by the backends filesystem logic. Because the API is unauthenticated and the CORS configuration in app.py is overly permissive (allow_origins=["*"] or allowing localhost), an external attacker can bypass the UI entirely. By using directory traversal sequences (../), an attacker can force the app to write arbitrary data to any location accessible by the current user's permissions. This vulnerability is fixed in 4.4.2.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-27897 affects WanderingAstronomer's Vociferous speech-to-text software in versions prior to 4.4.2. The issue lies in the export_file route implemented in src/api/system.py, which processes a JSON payload containing a filename and content to write files locally. The developer intended for file paths to be controlled via a native UI dialog, but the API itself does not validate or sanitize the filename parameter. This lack of validation allows an attacker to include directory traversal sequences (e.g., '../') in the filename, enabling arbitrary file writes outside the intended directory. Compounding the risk, the API is unauthenticated, and the CORS policy in app.py is overly permissive, allowing any origin or localhost, which enables remote attackers to bypass the UI and invoke the vulnerable API directly. Successful exploitation can lead to arbitrary file creation or modification with the privileges of the user running the application, potentially allowing attackers to overwrite critical system or application files, inject malicious code, or disrupt service availability. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-306 (Missing Authentication for Critical Function). The CVSS v3.1 base score is 10.0, reflecting network attack vector, no required privileges or user interaction, and complete compromise of confidentiality, integrity, and availability. The issue was publicly disclosed on March 11, 2026, and fixed in Vociferous version 4.4.2.
Potential Impact
This vulnerability poses a severe risk to organizations using Vociferous versions prior to 4.4.2. Exploitation allows remote, unauthenticated attackers to write arbitrary files anywhere on the filesystem accessible to the application user. This can lead to complete system compromise, including data theft, unauthorized code execution, persistent backdoors, and denial of service by overwriting critical files. Because the API is exposed with permissive CORS settings, attackers can exploit this from remote web origins, increasing the attack surface. Organizations relying on Vociferous for speech-to-text processing, especially in sensitive environments, face risks of intellectual property theft, operational disruption, and potential lateral movement within networks if the compromised host is part of a larger infrastructure. The critical severity and ease of exploitation make this a high-priority issue for immediate remediation.
Mitigation Recommendations
1. Upgrade Vociferous to version 4.4.2 or later, where this vulnerability is patched. 2. If upgrading immediately is not possible, restrict network access to the export_file API endpoint by implementing firewall rules or network segmentation to limit exposure. 3. Harden CORS policies by configuring app.py to allow only trusted origins instead of wildcard or localhost. 4. Implement additional input validation and sanitization on the filename parameter to reject directory traversal sequences and enforce strict path constraints. 5. Introduce authentication and authorization controls on the API endpoints to prevent unauthenticated access. 6. Monitor logs for suspicious file write activities or unexpected API calls. 7. Conduct regular security audits and penetration testing focused on API endpoints and file handling logic. 8. Educate developers on secure coding practices related to file system access and API security.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T15:19:29.717Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b1917d2f860ef9432c8e42
Added to database: 3/11/2026, 3:59:57 PM
Last enriched: 3/11/2026, 4:14:44 PM
Last updated: 3/13/2026, 11:51:45 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.