top of page
perceptive_background_267k.jpg

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the ex…

Published:

10 March 2026 at 23:00:00

Alert date:

11 March 2026 at 17:02:13

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

Vociferous speech-to-text application contains a directory traversal vulnerability in versions prior to 4.4.2. The vulnerability exists in src/api/system.py within the export_file route where the application accepts JSON payloads with filename and content without proper validation. Due to unauthenticated API access and permissive CORS configuration, external attackers can exploit directory traversal sequences (../) to write arbitrary data to any location accessible by the current user's permissions. The vulnerability bypasses the intended native UI dialog file handling mechanism. This issue has been fixed in version 4.4.2.

Technical details

Mitigation steps:

Affected products:

Vociferous

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page