Description
Vexa is an open-source, self-hostable meeting bot API and meeting transcription API. Prior to 0.10.0-260419-1910, the Vexa transcription-collector service exposes an internal endpoint `GET /internal/transcripts/{meeting_id}` that returns transcript data for any meeting without any authentication or authorization checks. An unauthenticated attacker can enumerate all meeting IDs, access any user's meeting transcripts without credentials, and steal confidential business conversations, passwords, and/or PII. Version 0.10.0-260419-1910 patches the issue.
Published: 2026-04-20
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: Unauthorized Data Exposure
Action: Patch
AI Analysis

Impact

The vulnerability is an unauthenticated and unauthorised internal endpoint GET /internal/transcripts/{meeting_id} that allowed any attacker to retrieve transcript data for any meeting. The weakness falls under missing authentication (CWE‑306) and missing authorization (CWE‑862). An attacker can enumerate meeting identifiers, download full transcripts, and therefore obtain confidential business conversations, passwords, and personal data, representing a significant breach of confidentiality.

Affected Systems

The issue affects the Vexa meeting bot and transcription API supplied by Vexa‑ai. Any deployment of the transcription‑collector service that is built from versions prior to 0.10.0‑260419‑1910 is vulnerable. Upgrading to the 0.10.0‑260419‑1910 release or newer removes the exposed internal endpoint.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity. The EPSS score is not available, but the lack of authentication means that once the service is reachable, an attacker can request transcript data with a simple HTTP GET. Because the endpoint is logical internal, the attack vector is likely in an internal network or a publicly exposed API; therefore, any organization running a vulnerable version on a network that can be reached by an attacker faces a high risk of confidential data leakage. The vulnerability is not listed in CISA KEV, but the lack of safeguards makes exploitation straightforward once the attacker has network access.

Generated by OpenCVE AI on April 20, 2026 at 17:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vexa to version 0.10.0‑260419‑1910 or later.
  • Block external network traffic to the internal transcripts endpoint using firewall or reverse‑proxy rules.
  • If an upgrade cannot be performed immediately, restrict access to the /internal/transcripts/{meeting_id} endpoint to trusted IP ranges and monitor for suspicious activity.

Generated by OpenCVE AI on April 20, 2026 at 17:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Description Vexa is an open-source, self-hostable meeting bot API and meeting transcription API. Prior to 0.10.0-260419-1910, the Vexa transcription-collector service exposes an internal endpoint `GET /internal/transcripts/{meeting_id}` that returns transcript data for any meeting without any authentication or authorization checks. An unauthenticated attacker can enumerate all meeting IDs, access any user's meeting transcripts without credentials, and steal confidential business conversations, passwords, and/or PII. Version 0.10.0-260419-1910 patches the issue.
Title Vexa's unauthenticated internal transcript endpoint exposed by default
Weaknesses CWE-306
CWE-862
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-20T16:12:27.988Z

Reserved: 2026-01-28T14:50:47.889Z

Link: CVE-2026-25058

cve-icon Vulnrichment

Updated: 2026-04-20T16:12:15.591Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-20T16:16:41.763

Modified: 2026-04-20T19:03:07.607

Link: CVE-2026-25058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T17:30:12Z

Weaknesses