CVE-2026-27897

Vociferous · Vociferous

Vociferous prior to 4.4.2 contains an unauthenticated directory traversal vulnerability in the export_file route, enabling arbitrary file writes to any location accessible by the application.

Executive summary

Vociferous versions prior to 4.4.2 are vulnerable to a critical unauthenticated directory traversal attack that allows remote actors to overwrite system files or deploy malicious payloads.

Vulnerability

The vulnerability exists in src/api/system.py within the export_file route. Because the API is unauthenticated and lacks filename validation, an attacker can use directory traversal sequences (e.g., ../) to bypass the intended UI and write arbitrary data to any path reachable by the user running the application.

Business impact

With a CVSS score of 10.0, this is a maximum-severity vulnerability. Attackers can achieve full system compromise by overwriting critical configuration files or placing executable scripts in startup directories. The overly permissive CORS configuration further increases the risk of exploitation via cross-site requests.

Remediation

Immediate Action: Update Vociferous to version 4.4.2 or later immediately to resolve the lack of input validation in the filesystem logic.

Proactive Monitoring: Review filesystem integrity for unauthorized changes in sensitive directories and monitor API logs for requests containing directory traversal patterns in the JSON payload.

Compensating Controls: Restrict network access to the Vociferous API using a firewall and modify the CORS configuration to disallow wildcard origins, limiting the attack surface.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The ability to write arbitrary files as an unauthenticated user is a critical failure in the application's security architecture. The urgency to apply the 4.4.2 patch cannot be overstated; failure to do so leaves the host system entirely exposed to remote compromise.