Impact
A path traversal weakness in the Beifong AI News and Podcast Agent backend permits an unauthenticated attacker to read any file on the server. The stream-audio endpoint concatenates a user-supplied path into a filesystem location without validation, enabling direct disclosure of configuration files, credentials, and other sensitive data. This flaw exposes the confidentiality of the system.
Affected Systems
The vulnerability is present in the awesome-llm-apps project, specifically in the Beifong AI News and Podcast Agent backend built with FastAPI. It resides in routers/podcast_router.py at the stream-audio route and is tied to commit e46690f99c3f08be80a9877fab52acacf7ab8251. Any deployment exposing this endpoint without authentication or proper input sanitization is susceptible. No specific vendor version information is provided.
Risk and Exploitability
No CVSS or EPSS scores are available, but the flaw can be exploited remotely via a crafted path parameter to the stream-audio endpoint. The attacker requires no credentials and merely sends a request to the exposed URL. While the exact frequency of exploitation is unknown, the simplicity of the input manipulation makes the vulnerability a significant risk to confidentiality. As the vulnerability is not listed in KEV, it may not yet be widely exploited, but the potential impact warrants immediate attention.
OpenCVE Enrichment