CVE-2024-34527: SolidUI: OpenAI API key exposed via log print statement
HIGHSolidUI 0.4.0 prints the OpenAI API key to stdout, which likely ends up in application logs, log aggregators, or CI/CD pipelines — anywhere logs flow. If you run SolidUI 0.4.0, rotate your OpenAI API key immediately and audit log storage for exposed credentials. Upgrade to a patched version and restrict log access.
Risk Assessment
CVSS 7.5 High is appropriate: no authentication required to exploit if logs are accessible (common in cloud environments with centralized logging). The blast radius is proportional to the API key's permissions — an exposed OpenAI key enables unauthorized inference calls, cost harvesting, and potential data exfiltration from prompt history. Risk elevates significantly in environments where logs flow to SIEM, log aggregators, or shared observability stacks accessible by broad teams.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Rotate the OpenAI API key immediately — assume it is compromised if the application has been running.
-
Upgrade SolidUI to a version that removes the print statement (see GitHub issue #279).
-
Audit all log storage (stdout, files, ELK/Splunk/CloudWatch) for the string pattern 'sk-' to detect exposed keys.
-
Restrict log access to authorized personnel only.
-
Enable OpenAI usage monitoring to detect anomalous API calls from the exposed key.
-
Implement a secrets scanner (e.g., truffleHog, detect-secrets) in CI/CD to catch future credential leaks pre-deployment.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-34527?
SolidUI 0.4.0 prints the OpenAI API key to stdout, which likely ends up in application logs, log aggregators, or CI/CD pipelines — anywhere logs flow. If you run SolidUI 0.4.0, rotate your OpenAI API key immediately and audit log storage for exposed credentials. Upgrade to a patched version and restrict log access.
Is CVE-2024-34527 actively exploited?
No confirmed active exploitation of CVE-2024-34527 has been reported, but organizations should still patch proactively.
How to fix CVE-2024-34527?
1. Rotate the OpenAI API key immediately — assume it is compromised if the application has been running. 2. Upgrade SolidUI to a version that removes the print statement (see GitHub issue #279). 3. Audit all log storage (stdout, files, ELK/Splunk/CloudWatch) for the string pattern 'sk-' to detect exposed keys. 4. Restrict log access to authorized personnel only. 5. Enable OpenAI usage monitoring to detect anomalous API calls from the exposed key. 6. Implement a secrets scanner (e.g., truffleHog, detect-secrets) in CI/CD to catch future credential leaks pre-deployment.
What systems are affected by CVE-2024-34527?
This vulnerability affects the following AI/ML architecture patterns: LLM API integrations, AI-powered web applications, Shared logging and observability pipelines, CI/CD pipelines with stdout capture.
What is the CVSS score for CVE-2024-34527?
CVE-2024-34527 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.11%.
Technical Details
NVD Description
spaces_plugin/app.py in SolidUI 0.4.0 has an unnecessary print statement for an OpenAI key. The printed string might be logged.
Exploitation Scenario
An adversary with read access to application logs — via a misconfigured log aggregator, a compromised DevOps account, or even a public-facing log viewer — searches for the string pattern 'sk-' in SolidUI stdout or log files. They extract the OpenAI API key, then use it to make inference calls to GPT-4 (or access fine-tuned models under the victim's org), rack up API costs, or query the model for data it may have been fine-tuned on. In a CI/CD leak scenario, the key appears in build logs accessible to all repo contributors.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2025-5120 10.0 smolagents: sandbox escape enables unauthenticated RCE
Same attack type: Data Leakage CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Data Leakage CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same attack type: Data Extraction
AI Threat Alert