{"data":{"id":"d188bb48-ffcc-4892-9a1c-c6ddde3a783e","title":"GHSA-vvxm-vxmr-624h: Open WebUI vulnerable to Path Traversal in `POST /api/v1/audio/transcriptions`","summary":"Open WebUI's speech-to-text endpoint has a path traversal vulnerability where an authenticated user can craft a malicious filename to trigger an error that leaks the server's absolute file path. The vulnerability exists because the code doesn't sanitize the filename before using it in a file operation, unlike similar upload handlers elsewhere in the codebase.","solution":"The source recommends two fixes: (1) sanitize the file extension using `Path(file.filename).name` and `Path(safe_name).suffix.lstrip(\".\")` instead of the current `split(\".\")[-1]` approach, and (2) suppress the internal path from error responses by catching exceptions and returning a generic error message (\"Transcription failed\") instead of returning the full exception details.","labels":["security"],"sourceUrl":"https://github.com/advisories/GHSA-vvxm-vxmr-624h","publishedAt":"2026-03-27T15:29:32.000Z","cveId":"CVE-2026-28786","cweIds":null,"cvssScore":null,"cvssSeverity":"medium","severity":"medium","attackType":["pii_leakage"],"issueType":"vulnerability","affectedPackages":["open-webui@< 0.8.6 (fixed: 0.8.6)"],"affectedVendors":[],"affectedVendorsRaw":["Open WebUI"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":"unknown","epssScore":0.0002,"patchAvailable":true,"disclosureDate":"2026-03-27T15:29:32.000Z","capecIds":null,"crossRefCount":0,"attackSophistication":"trivial","impactType":["confidentiality"],"aiComponentTargeted":"api","llmSpecific":false,"classifierConfidence":0.95,"researchCategory":null,"atlasIds":null}}