Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27897: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WanderingAstronomer Vociferous

0
Critical
VulnerabilityCVE-2026-27897cvecve-2026-27897cwe-22cwe-306
Published: Wed Mar 11 2026 (03/11/2026, 15:30:19 UTC)
Source: CVE Database V5
Vendor/Project: WanderingAstronomer
Product: Vociferous

Description

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by the backends filesystem logic. Because the API is unauthenticated and the CORS configuration in app.py is overly permissive (allow_origins=["*"] or allowing localhost), an external attacker can bypass the UI entirely. By using directory traversal sequences (../), an attacker can force the app to write arbitrary data to any location accessible by the current user's permissions. This vulnerability is fixed in 4.4.2.

AI-Powered Analysis

AILast updated: 03/11/2026, 16:14:44 UTC

Technical Analysis

The vulnerability CVE-2026-27897 affects WanderingAstronomer's Vociferous speech-to-text software in versions prior to 4.4.2. The issue lies in the export_file route implemented in src/api/system.py, which processes a JSON payload containing a filename and content to write files locally. The developer intended for file paths to be controlled via a native UI dialog, but the API itself does not validate or sanitize the filename parameter. This lack of validation allows an attacker to include directory traversal sequences (e.g., '../') in the filename, enabling arbitrary file writes outside the intended directory. Compounding the risk, the API is unauthenticated, and the CORS policy in app.py is overly permissive, allowing any origin or localhost, which enables remote attackers to bypass the UI and invoke the vulnerable API directly. Successful exploitation can lead to arbitrary file creation or modification with the privileges of the user running the application, potentially allowing attackers to overwrite critical system or application files, inject malicious code, or disrupt service availability. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-306 (Missing Authentication for Critical Function). The CVSS v3.1 base score is 10.0, reflecting network attack vector, no required privileges or user interaction, and complete compromise of confidentiality, integrity, and availability. The issue was publicly disclosed on March 11, 2026, and fixed in Vociferous version 4.4.2.

Potential Impact

This vulnerability poses a severe risk to organizations using Vociferous versions prior to 4.4.2. Exploitation allows remote, unauthenticated attackers to write arbitrary files anywhere on the filesystem accessible to the application user. This can lead to complete system compromise, including data theft, unauthorized code execution, persistent backdoors, and denial of service by overwriting critical files. Because the API is exposed with permissive CORS settings, attackers can exploit this from remote web origins, increasing the attack surface. Organizations relying on Vociferous for speech-to-text processing, especially in sensitive environments, face risks of intellectual property theft, operational disruption, and potential lateral movement within networks if the compromised host is part of a larger infrastructure. The critical severity and ease of exploitation make this a high-priority issue for immediate remediation.

Mitigation Recommendations

1. Upgrade Vociferous to version 4.4.2 or later, where this vulnerability is patched. 2. If upgrading immediately is not possible, restrict network access to the export_file API endpoint by implementing firewall rules or network segmentation to limit exposure. 3. Harden CORS policies by configuring app.py to allow only trusted origins instead of wildcard or localhost. 4. Implement additional input validation and sanitization on the filename parameter to reject directory traversal sequences and enforce strict path constraints. 5. Introduce authentication and authorization controls on the API endpoints to prevent unauthenticated access. 6. Monitor logs for suspicious file write activities or unexpected API calls. 7. Conduct regular security audits and penetration testing focused on API endpoints and file handling logic. 8. Educate developers on secure coding practices related to file system access and API security.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T15:19:29.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1917d2f860ef9432c8e42

Added to database: 3/11/2026, 3:59:57 PM

Last enriched: 3/11/2026, 4:14:44 PM

Last updated: 3/13/2026, 11:51:45 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses