๐Ÿ” CVE Alert

CVE-2026-34981

MEDIUM 5.8

whisperX REST API: SSRF in download_from_url() โ€” URL validation happens after HTTP request, extension bypass via .mp3

CVSS Score
5.8
EPSS Score
0.0%
EPSS Percentile
0th

The whisperX API is a tool for enhancing and analyzing audio content. From 0.3.1 to 0.5.0, FileService.download_from_url() in app/services/file_service.py calls requests.get(url) with zero URL validation. The file extension check occurs AFTER the HTTP request is already made, and can be bypassed by appending .mp3 to any internal URL. The /speech-to-text-url endpoint is unauthenticated. This vulnerability is fixed in 0.6.0.

CWE CWE-918
Vendor pavelzbornik
Product whisperx-fastapi
Published Apr 6, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for pavelzbornik whisperx-fastapi

Be the first to know when new medium vulnerabilities affecting pavelzbornik whisperx-fastapi are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

pavelzbornik / whisperX-FastAPI
>= 0.3.1, < 0.6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/pavelzbornik/whisperX-FastAPI/security/advisories/GHSA-6rc7-r867-c635 github.com: https://github.com/pavelzbornik/whisperX-FastAPI/issues/256 github.com: https://github.com/pavelzbornik/whisperX-FastAPI/commit/ef78fe2001deede5354031e4200d41c6a7e8cbfc