CVE-2026-29871
Path Traversal in awesome-llm-apps FastAPI Allows Arbitrary File Read
Publication date: 2026-03-27
Last updated on: 2026-04-02
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| theunwindai | awesome_llm_apps | to 2026-01-19 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a path traversal issue in the Beifong AI News and Podcast Agent backend, specifically in the FastAPI stream-audio endpoint. The endpoint accepts a filename parameter from the user and concatenates it directly with a fixed directory path without validating or normalizing the input.
Because the input is not sanitized, an attacker can include traversal sequences like "../" to escape the intended directory and access arbitrary files on the server's filesystem.
This allows an unauthenticated remote attacker to read sensitive files such as configuration files, credentials, API keys, internal source code, or logs by requesting paths outside the designated audio directory.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a severe breach of confidentiality. An attacker can remotely and without authentication read any file accessible by the application on the server.
This can lead to disclosure of sensitive information such as environment variables, API keys, database credentials, internal source code, and logs.
There is no impact on the integrity or availability of the system, but the exposure of sensitive data can lead to further attacks or compromise of the system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access files outside the intended directory via the vulnerable endpoint `/stream-audio/{filename}` using path traversal payloads.
A practical detection method is to send HTTP requests with crafted filenames containing traversal sequences like `../` to see if arbitrary files can be read.
For example, using curl with the `--path-as-is` option to prevent curl from normalizing the path, you can test if the server returns sensitive files such as `.env`.
- curl --path-as-is http://<target-host>/stream-audio/../../.env
If the server responds with the contents of the `.env` file or other files outside the intended directory, the vulnerability is present.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves implementing proper validation and containment checks on the user-supplied path parameter before accessing the filesystem.
Specifically, use Python's pathlib to resolve and verify that the requested file path is within the allowed base directory.
- Define a base directory, e.g., BASE_DIR = Path("podcasts/audio").resolve()
- Resolve the requested path and check if it is relative to BASE_DIR using requested_path.is_relative_to(BASE_DIR)
- If the check fails, return an HTTP 403 Forbidden response to block access.
Serve files only after successful validation, for example using FastAPI's FileResponse.
These steps prevent path traversal by rejecting any request attempting to access files outside the designated directory.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthenticated remote attackers to read arbitrary files on the server, including sensitive files such as configuration files and credentials. Such unauthorized disclosure of sensitive information can lead to violations of data protection regulations like GDPR and HIPAA, which require strict controls over the confidentiality and security of personal and sensitive data.
Because the vulnerability compromises confidentiality by exposing potentially sensitive data without authorization, it undermines compliance with standards that mandate protecting sensitive information from unauthorized access.