Openwebui

Open Webui

43 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.99%
  • Veröffentlicht 20.03.2025 10:10:48
  • Zuletzt bearbeitet 29.07.2025 18:06:23

In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without pro...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 20.03.2025 10:10:40
  • Zuletzt bearbeitet 15.10.2025 13:15:51

An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/f...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 20.03.2025 10:10:35
  • Zuletzt bearbeitet 15.10.2025 13:15:53

In version 0.3.8 of open-webui, an endpoint for converting markdown to HTML is exposed without authentication. A maliciously crafted markdown payload can cause the server to spend excessive time converting it, leading to a denial of service. The serv...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 20.03.2025 10:10:23
  • Zuletzt bearbeitet 29.07.2025 18:05:55

A Stored Cross-Site Scripting (XSS) vulnerability exists in the chat file upload functionality of open-webui/open-webui version 0.3.8. An attacker can inject malicious content into a file, which, when accessed by a victim through a URL or shared chat...

  • EPSS 0.05%
  • Veröffentlicht 20.03.2025 10:10:22
  • Zuletzt bearbeitet 15.04.2025 16:15:21

Rejected reason: ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-47874. Notes: All CVE users should reference CVE-2024-47874 instead of this CVE Record. All references and descriptions in this candidate ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 20.03.2025 10:10:18
  • Zuletzt bearbeitet 15.10.2025 13:15:51

In version v0.3.8 of open-webui/open-webui, improper access control vulnerabilities allow an attacker to view any prompts. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/pr...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 20.03.2025 10:10:03
  • Zuletzt bearbeitet 29.07.2025 18:06:09

In version v0.3.8 of open-webui/open-webui, sensitive actions such as deleting and resetting are performed using the GET method. This vulnerability allows an attacker to perform Cross-Site Request Forgery (CSRF) attacks, where an unaware user can uni...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 20.03.2025 10:09:57
  • Zuletzt bearbeitet 18.07.2025 19:54:28

A vulnerability in open-webui/open-webui v0.3.8 allows an unauthenticated attacker to sign up with excessively large text in the 'name' field, causing the Admin panel to become unresponsive. This prevents administrators from performing essential user...

Exploit
  • EPSS 1.16%
  • Veröffentlicht 20.03.2025 10:09:54
  • Zuletzt bearbeitet 29.07.2025 18:07:55

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 20.03.2025 10:09:45
  • Zuletzt bearbeitet 15.10.2025 13:15:51

In version v0.3.8 of open-webui/open-webui, there is an improper access control vulnerability. On the frontend admin page, administrators are intended to view only the chats of non-admin members. However, by modifying the user_id parameter, it is pos...