PipesHub is a fully extensible workplace AI platform for enterprise search and workflow automation. Versions prior to 0.1.0-beta expose POST /api/v1/record/buffer/convert through missing authentication. The endpoint accepts a file upload and converts it to PDF via LibreOffice by uploading payload to os.path.join(tmpdir, file.filename) without normalizing the filename. An attacker can submit a crafted filename containing ../ sequences to write arbitrary files anywhere the service account has permission, enabling remote file overwrite or planting malicious code. This issue is fixed in version 0.1.0-beta.
History

Wed, 10 Dec 2025 00:45:00 +0000

Type Values Removed Values Added
Description PipesHub is a fully extensible workplace AI platform for enterprise search and workflow automation. Versions prior to 0.1.0-beta expose POST /api/v1/record/buffer/convert through missing authentication. The endpoint accepts a file upload and converts it to PDF via LibreOffice by uploading payload to os.path.join(tmpdir, file.filename) without normalizing the filename. An attacker can submit a crafted filename containing ../ sequences to write arbitrary files anywhere the service account has permission, enabling remote file overwrite or planting malicious code. This issue is fixed in version 0.1.0-beta.
Title PipesHub Vulnerable to Path Traversal through Unauthenticated Arbitrary File Upload
Weaknesses CWE-22
CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-10T00:36:16.730Z

Updated: 2025-12-10T00:36:16.730Z

Reserved: 2025-12-08T21:36:28.780Z

Link: CVE-2025-67506

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-10T01:15:52.293

Modified: 2025-12-10T01:15:52.293

Link: CVE-2025-67506

cve-icon Redhat

No data.