I would first introduce one more question / concern: metadata. Even if a reader is not a confidential source, they might subject themselves to harassment if they uploaded an image file that was tagged with location coordinates in EXIF image metadata.
Here are some further comments on particular file types:
Document files:
Consider rendering the files to images or "clean" PDFs of images with no scripts. Micah Lee at The Intercept put some code out for redacting and cleaning PDFs that might be helpful. https://firstlook.org/code/project/pdf-redact-tools/
You might also be able to do some scripted conversion of doc(x) / ppt(x) files to "clean" PDFs using LibreOffice and its libraries. I recommend that you avoid publishing Office documents because it's a terrible reader experience and very un-web friendly. Not everyone has Office / LibreOffice, nor do they want to wait for it to load.
Office documents also carry metadata like authors, modifications, computer name, and sometimes change history. The submitter may be sharing more information than they are aware they are.
You should also look at whether DocumentCloud or something similar should be part of your flow.
Image files:
Stripping metadata is important. There have been exploits against image processing engines, so some kind of minor tweak (as @tomrittervg suggests) might break exploit code, and / or cause it to run on your submission processing server but possibly not make it to readers.
To give you an idea of what you might need to worry about on your server: there was a recent series of exploits found against ImageMagick, which is often used for image processing. https://imagetragick.com/
Video & Audio files:
I'm less knowledgeable about issues with video and audio files, but you should seek to strip metadata at a minimum. Transcoding video and audio might be necessary for practical (storage & bandwidth) reasons. This would generally rearrange the data and likely break any exploits. The audio / video processing software could trigger exploits, but this would again likely prevent readers from being exposed.
I suggest that you do the processing of submissions on a separate server / virtual machine, and periodically destroy the VM and replace it. This will help wipe out anyone that might have broken in through a file exploit, if that exploit was subsequently patched. You should also be able to monitor it decently from a security standpoint, since it does not need to do anything other than process files. If you use a DevOps automation tool like ansible or puppet, the work involved in creating new VMs will be minimal.