Openwebui

Open Webui

48 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.17%
  • Veröffentlicht 20.03.2025 10:11:16
  • Zuletzt bearbeitet 01.04.2025 20:33:49

A vulnerability in open-webui/open-webui version 0.3.8 allows an attacker with a user-level account to perform a session fixation attack. The session cookie for all users is set with the default `SameSite=Lax` and does not have the `Secure` flag enab...

Exploit
  • EPSS 0.78%
  • Veröffentlicht 20.03.2025 10:11:13
  • Zuletzt bearbeitet 27.03.2025 11:15:36

In version v0.3.10 of open-webui/open-webui, the `api/v1/utils/pdf` endpoint lacks authentication mechanisms, allowing unauthenticated attackers to access the PDF generation service. This vulnerability can be exploited by sending a POST request with ...

Exploit
  • EPSS 0.75%
  • Veröffentlicht 20.03.2025 10:11:05
  • Zuletzt bearbeitet 26.03.2025 16:46:35

A vulnerability in open-webui/open-webui versions <= 0.3.8 allows remote code execution by non-admin users via Cross-Site Request Forgery (CSRF). The application uses cookies with the SameSite attribute set to lax for authentication and lacks CSRF to...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 20.03.2025 10:11:02
  • Zuletzt bearbeitet 15.10.2025 13:15:50

In open-webui/open-webui version v0.3.8, there is an improper privilege management vulnerability. The application allows an attacker, acting as an admin, to delete other administrators via the API endpoint `http://0.0.0.0:8080/api/v1/users/{uuid_admi...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 20.03.2025 10:10:52
  • Zuletzt bearbeitet 18.07.2025 19:59:05

In version v0.3.32 of open-webui/open-webui, the application allows users to submit large payloads in the email and password fields during the sign-in process due to the lack of character length validation on these inputs. This vulnerability can lead...

Exploit
  • EPSS 2.99%
  • Veröffentlicht 20.03.2025 10:10:48
  • Zuletzt bearbeitet 29.07.2025 18:06:23

In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without pro...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 20.03.2025 10:10:40
  • Zuletzt bearbeitet 15.10.2025 13:15:51

An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/f...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 20.03.2025 10:10:35
  • Zuletzt bearbeitet 15.10.2025 13:15:53

In version 0.3.8 of open-webui, an endpoint for converting markdown to HTML is exposed without authentication. A maliciously crafted markdown payload can cause the server to spend excessive time converting it, leading to a denial of service. The serv...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 20.03.2025 10:10:23
  • Zuletzt bearbeitet 29.07.2025 18:05:55

A Stored Cross-Site Scripting (XSS) vulnerability exists in the chat file upload functionality of open-webui/open-webui version 0.3.8. An attacker can inject malicious content into a file, which, when accessed by a victim through a URL or shared chat...

  • EPSS 0.05%
  • Veröffentlicht 20.03.2025 10:10:22
  • Zuletzt bearbeitet 15.04.2025 16:15:21

Rejected reason: ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-47874. Notes: All CVE users should reference CVE-2024-47874 instead of this CVE Record. All references and descriptions in this candidate ...