Openwebui

Open Webui

43 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.06%
  • Veröffentlicht 20.03.2025 10:09:38
  • Zuletzt bearbeitet 15.10.2025 13:15:51

An improper access control vulnerability in open-webui/open-webui v0.3.8 allows an attacker to view admin details. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/auths/admi...

Exploit
  • EPSS 0.77%
  • Veröffentlicht 20.03.2025 10:09:10
  • Zuletzt bearbeitet 04.04.2025 09:15:15

In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of c...

  • EPSS 0.09%
  • Veröffentlicht 20.03.2025 10:09:04
  • Zuletzt bearbeitet 15.04.2025 16:15:47

Rejected reason: ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-53981. Notes: All CVE users should reference CVE-2024-53981 instead of this CVE Record. All references and descriptions in this candidate ...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 20.03.2025 10:09:00
  • Zuletzt bearbeitet 21.07.2025 20:06:27

The `/openai/models` endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 20.03.2025 10:08:55
  • Zuletzt bearbeitet 21.07.2025 20:07:26

A stored cross-site scripting (XSS) vulnerability exists in open-webui/open-webui version 0.3.8. The vulnerability is present in the `/api/v1/models/add` endpoint, where the model description field is improperly sanitized before being rendered in cha...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 10.10.2024 08:15:03
  • Zuletzt bearbeitet 17.10.2024 14:22:44

In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. This allows the user to perform actions without admin confirmation, bypassing the intended approval process.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 10.10.2024 02:15:03
  • Zuletzt bearbeitet 15.10.2025 13:15:51

In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a ...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 09.10.2024 20:15:09
  • Zuletzt bearbeitet 15.10.2025 13:15:51

An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the API endpoint `http://0.0.0.0:3000/api/v1/memories/{id}/update`, where the decentralization design is flawed, allo...

Exploit
  • EPSS 2.28%
  • Veröffentlicht 09.10.2024 20:15:09
  • Zuletzt bearbeitet 29.07.2025 18:47:38

In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 09.10.2024 19:15:14
  • Zuletzt bearbeitet 03.11.2024 17:15:15

An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides...