Description
PipesHub is a fully extensible workplace AI platform for enterprise search and workflow automation. Versions prior to 0.1.0-beta expose POST /api/v1/record/buffer/convert through missing authentication. The endpoint accepts a file upload and converts it to PDF via LibreOffice by uploading payload to os.path.join(tmpdir, file.filename) without normalizing the filename. An attacker can submit a crafted filename containing ../ sequences to write arbitrary files anywhere the service account has permission, enabling remote file overwrite or planting malicious code. This issue is fixed in version 0.1.0-beta.
Published: 2025-12-10
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Pipeshub
Pipeshub pipeshub
CPEs cpe:2.3:a:pipeshub:pipeshub:0.1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:pipeshub:pipeshub:0.1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:pipeshub:pipeshub:0.1.3:alpha:*:*:*:*:*:*
Vendors & Products Pipeshub
Pipeshub pipeshub

Thu, 11 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Pipeshub-ai
Pipeshub-ai pipeshub-ai
Vendors & Products Pipeshub-ai
Pipeshub-ai pipeshub-ai

Wed, 10 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 00:45:00 +0000

Type Values Removed Values Added
Description PipesHub is a fully extensible workplace AI platform for enterprise search and workflow automation. Versions prior to 0.1.0-beta expose POST /api/v1/record/buffer/convert through missing authentication. The endpoint accepts a file upload and converts it to PDF via LibreOffice by uploading payload to os.path.join(tmpdir, file.filename) without normalizing the filename. An attacker can submit a crafted filename containing ../ sequences to write arbitrary files anywhere the service account has permission, enabling remote file overwrite or planting malicious code. This issue is fixed in version 0.1.0-beta.
Title PipesHub Vulnerable to Path Traversal through Unauthenticated Arbitrary File Upload
Weaknesses CWE-22
CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Pipeshub Pipeshub
Pipeshub-ai Pipeshub-ai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-10T15:35:47.244Z

Reserved: 2025-12-08T21:36:28.780Z

Link: CVE-2025-67506

cve-icon Vulnrichment

Updated: 2025-12-10T15:35:43.173Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-10T01:15:52.293

Modified: 2026-03-17T20:31:15.077

Link: CVE-2025-67506

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-11T21:38:22Z

Weaknesses