Description
Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by the backends filesystem logic. Because the API is unauthenticated and the CORS configuration in app.py is overly permissive (allow_origins=["*"] or allowing localhost), an external attacker can bypass the UI entirely. By using directory traversal sequences (../), an attacker can force the app to write arbitrary data to any location accessible by the current user's permissions. This vulnerability is fixed in 4.4.2.
Published: 2026-03-11
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the export_file route of Vociferous versions earlier than 4.4.2. The API accepts a JSON payload that contains a filename and content, but the filename is not validated by the backend. This omission allows directory traversal sequences such as "../", which enable an attacker to instruct the application to write arbitrary data to any directory that is writable by the process user. The API is unauthenticated and the CORS policy is permissive, allowing cross‑origin requests from any domain; thus the likely attack vector is an unauthenticated HTTP request that originates from a foreign origin, inferred from the permissive CORS setting. If an attacker supplies a file that contains executable code or modifies a configuration file, the application will run that code with the privileges of the process, giving the attacker remote code execution capabilities. The weakness involves missing input validation (CWE‑22) and absent authentication controls (CWE‑306).

Affected Systems

The affected product is Vociferous developed by WanderingAstronomer. All releases prior to 4.4.2 contain the flaw. No other vendors or product versions are indicated in the advisory. This is a cross‑platform offline speech‑to‑text application with local AI refinement.

Risk and Exploitability

The vulnerability has a CVSS score of 10, indicating critical severity, yet the EPSS score is less than 1%, suggesting a low probability of exploitation at present. It is not listed in CISA’s KEV catalog. Exploitation requires supplying a crafted JSON payload to the unauthenticated /export_file endpoint and using directory traversal to write malicious files. Because the shared CORS policy accepts any origin, an attacker can bypass the native user interface and submit these requests without authentication, inferred from the available configuration. If a malicious executable is written, remote code execution can occur with the application’s privileges.

Generated by OpenCVE AI on March 20, 2026 at 15:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vociferous to version 4.4.2 or later.
  • Restrict the CORS policy to trusted origins only.
  • Implement authentication for the export_file endpoint to prevent unauthenticated use.
  • Monitor application logs for abnormal file write attempts and directory traversal strings.

Generated by OpenCVE AI on March 20, 2026 at 15:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wanderingastronomer:vociferous:*:*:*:*:*:*:*:*

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wanderingastronomer
Wanderingastronomer vociferous
Vendors & Products Wanderingastronomer
Wanderingastronomer vociferous

Wed, 11 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by the backends filesystem logic. Because the API is unauthenticated and the CORS configuration in app.py is overly permissive (allow_origins=["*"] or allowing localhost), an external attacker can bypass the UI entirely. By using directory traversal sequences (../), an attacker can force the app to write arbitrary data to any location accessible by the current user's permissions. This vulnerability is fixed in 4.4.2.
Title Vociferous Unauthenticated Remote Path Traversal (RCE via CSRF)
Weaknesses CWE-22
CWE-306
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Wanderingastronomer Vociferous
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T17:27:29.687Z

Reserved: 2026-02-24T15:19:29.717Z

Link: CVE-2026-27897

cve-icon Vulnrichment

Updated: 2026-03-11T17:27:08.913Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T16:16:40.133

Modified: 2026-03-20T14:27:12.263

Link: CVE-2026-27897

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:55:31Z

Weaknesses