CVE-2024-34527: SolidUI: OpenAI API key exposed via log print statement

HIGH
Published May 6, 2024
CISO Take

SolidUI 0.4.0 prints the OpenAI API key to stdout, which likely ends up in application logs, log aggregators, or CI/CD pipelines — anywhere logs flow. If you run SolidUI 0.4.0, rotate your OpenAI API key immediately and audit log storage for exposed credentials. Upgrade to a patched version and restrict log access.

Risk Assessment

CVSS 7.5 High is appropriate: no authentication required to exploit if logs are accessible (common in cloud environments with centralized logging). The blast radius is proportional to the API key's permissions — an exposed OpenAI key enables unauthorized inference calls, cost harvesting, and potential data exfiltration from prompt history. Risk elevates significantly in environments where logs flow to SIEM, log aggregators, or shared observability stacks accessible by broad teams.

Severity & Risk

CVSS 3.1
7.5 / 10
EPSS
0.1%
chance of exploitation in 30 days
Higher than 29% of all CVEs
Exploitation Status
No known exploitation
Sophistication
Trivial

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C High
I None
A None

Recommended Action

6 steps
  1. Rotate the OpenAI API key immediately — assume it is compromised if the application has been running.

  2. Upgrade SolidUI to a version that removes the print statement (see GitHub issue #279).

  3. Audit all log storage (stdout, files, ELK/Splunk/CloudWatch) for the string pattern 'sk-' to detect exposed keys.

  4. Restrict log access to authorized personnel only.

  5. Enable OpenAI usage monitoring to detect anomalous API calls from the exposed key.

  6. Implement a secrets scanner (e.g., truffleHog, detect-secrets) in CI/CD to catch future credential leaks pre-deployment.

CISA SSVC Assessment

Decision Track
Exploitation none
Automatable Yes
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Art. 9.7 - Risk Management System — Cybersecurity Measures
ISO 42001
A.6.1.5 - Information Security in AI System Development
NIST AI RMF
MANAGE-2.2 - Risk Response — Treatment of Identified Risks
OWASP LLM Top 10
LLM02:2025 - Sensitive Information Disclosure

Frequently Asked Questions

What is CVE-2024-34527?

SolidUI 0.4.0 prints the OpenAI API key to stdout, which likely ends up in application logs, log aggregators, or CI/CD pipelines — anywhere logs flow. If you run SolidUI 0.4.0, rotate your OpenAI API key immediately and audit log storage for exposed credentials. Upgrade to a patched version and restrict log access.

Is CVE-2024-34527 actively exploited?

No confirmed active exploitation of CVE-2024-34527 has been reported, but organizations should still patch proactively.

How to fix CVE-2024-34527?

1. Rotate the OpenAI API key immediately — assume it is compromised if the application has been running. 2. Upgrade SolidUI to a version that removes the print statement (see GitHub issue #279). 3. Audit all log storage (stdout, files, ELK/Splunk/CloudWatch) for the string pattern 'sk-' to detect exposed keys. 4. Restrict log access to authorized personnel only. 5. Enable OpenAI usage monitoring to detect anomalous API calls from the exposed key. 6. Implement a secrets scanner (e.g., truffleHog, detect-secrets) in CI/CD to catch future credential leaks pre-deployment.

What systems are affected by CVE-2024-34527?

This vulnerability affects the following AI/ML architecture patterns: LLM API integrations, AI-powered web applications, Shared logging and observability pipelines, CI/CD pipelines with stdout capture.

What is the CVSS score for CVE-2024-34527?

CVE-2024-34527 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.11%.

Technical Details

NVD Description

spaces_plugin/app.py in SolidUI 0.4.0 has an unnecessary print statement for an OpenAI key. The printed string might be logged.

Exploitation Scenario

An adversary with read access to application logs — via a misconfigured log aggregator, a compromised DevOps account, or even a public-facing log viewer — searches for the string pattern 'sk-' in SolidUI stdout or log files. They extract the OpenAI API key, then use it to make inference calls to GPT-4 (or access fine-tuned models under the victim's org), rack up API costs, or query the model for data it may have been fine-tuned on. In a CI/CD leak scenario, the key appears in build logs accessible to all repo contributors.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Timeline

Published
May 6, 2024
Last Modified
November 21, 2024
First Seen
May 6, 2024

Related Vulnerabilities