CVE-2024-7046
- EPSS 0.06%
- Veröffentlicht 20.03.2025 10:09:38
- Zuletzt bearbeitet 15.10.2025 13:15:51
An improper access control vulnerability in open-webui/open-webui v0.3.8 allows an attacker to view admin details. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/auths/admi...
CVE-2024-12537
- EPSS 0.77%
- Veröffentlicht 20.03.2025 10:09:10
- Zuletzt bearbeitet 04.04.2025 09:15:15
In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of c...
CVE-2024-9840
- EPSS 0.09%
- Veröffentlicht 20.03.2025 10:09:04
- Zuletzt bearbeitet 15.04.2025 16:15:47
Rejected reason: ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-53981. Notes: All CVE users should reference CVE-2024-53981 instead of this CVE Record. All references and descriptions in this candidate ...
CVE-2024-7959
- EPSS 0.36%
- Veröffentlicht 20.03.2025 10:09:00
- Zuletzt bearbeitet 21.07.2025 20:06:27
The `/openai/models` endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and...
CVE-2024-7990
- EPSS 0.16%
- Veröffentlicht 20.03.2025 10:08:55
- Zuletzt bearbeitet 21.07.2025 20:07:26
A stored cross-site scripting (XSS) vulnerability exists in open-webui/open-webui version 0.3.8. The vulnerability is present in the `/api/v1/models/add` endpoint, where the model description field is improperly sanitized before being rendered in cha...
CVE-2024-7049
- EPSS 0.06%
- Veröffentlicht 10.10.2024 08:15:03
- Zuletzt bearbeitet 17.10.2024 14:22:44
In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. This allows the user to perform actions without admin confirmation, bypassing the intended approval process.
CVE-2024-7048
- EPSS 0.14%
- Veröffentlicht 10.10.2024 02:15:03
- Zuletzt bearbeitet 15.10.2025 13:15:51
In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a ...
CVE-2024-7041
- EPSS 0.15%
- Veröffentlicht 09.10.2024 20:15:09
- Zuletzt bearbeitet 15.10.2025 13:15:51
An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the API endpoint `http://0.0.0.0:3000/api/v1/memories/{id}/update`, where the decentralization design is flawed, allo...
CVE-2024-7037
- EPSS 2.28%
- Veröffentlicht 09.10.2024 20:15:09
- Zuletzt bearbeitet 29.07.2025 18:47:38
In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete...
CVE-2024-7038
- EPSS 0.21%
- Veröffentlicht 09.10.2024 19:15:14
- Zuletzt bearbeitet 03.11.2024 17:15:15
An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides...