CVE-2024-2029

A command injection vulnerability exists in the `TranscriptEndpoint` of mudler/localai, specifically within the `audioToWav` function used for converting audio files to WAV format for transcription. The vulnerability arises due to the lack of sanitization of user-supplied filenames before passing them to ffmpeg via a shell command, allowing an attacker to execute arbitrary commands on the host system. Successful exploitation could lead to unauthorized access, data breaches, or other detrimental impacts, depending on the privileges of the process executing the code.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:*

History

15 Jul 2025, 15:25

Type Values Removed Values Added
CWE CWE-78
First Time Mudler
Mudler localai
CPE cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:*
References () https://github.com/mudler/localai/commit/31a4c9c9d3abc58de2bdc5305419181c8b33eb1c - () https://github.com/mudler/localai/commit/31a4c9c9d3abc58de2bdc5305419181c8b33eb1c - Patch
References () https://huntr.com/bounties/e092528a-ce3b-4e66-9b98-3f56d6b276b0 - () https://huntr.com/bounties/e092528a-ce3b-4e66-9b98-3f56d6b276b0 - Exploit, Third Party Advisory

10 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 17:15

Updated : 2025-07-15 15:25


NVD link : CVE-2024-2029

Mitre link : CVE-2024-2029


JSON object : View

Products Affected

mudler

  • localai
CWE

No CWE.