Lucene search

K
OpenwebuiOpen Webui

21 matches found

CVE
CVE
added 2025/03/20 10:15 a.m.66 views

CVE-2024-8053

In version v0.3.10 of open-webui/open-webui, the api/v1/utils/pdf endpoint lacks authentication mechanisms, allowing unauthenticated attackers to access the PDF generation service. This vulnerability can be exploited by sending a POST request with an excessively large payload, potentially leading t...

8.2CVSS7.5AI score0.00695EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.65 views

CVE-2024-12537

In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the api/v1/utils/code/format endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unrespon...

7.5CVSS7.7AI score0.0046EPSS
CVE
CVE
added 2024/08/07 11:15 p.m.63 views

CVE-2024-6707

Attacker controlled files can be uploaded to arbitrary locations on the web server's filesystem by abusing a path traversal vulnerability.

8.8CVSS6.7AI score0.00099EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.62 views

CVE-2024-7043

An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all fi...

8.8CVSS7.8AI score0.00043EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.62 views

CVE-2024-7990

A stored cross-site scripting (XSS) vulnerability exists in open-webui/open-webui version 0.3.8. The vulnerability is present in the /api/v1/models/add endpoint, where the model description field is improperly sanitized before being rendered in chat. This allows an attacker to inject malicious scri...

8.4CVSS7.6AI score0.00096EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.58 views

CVE-2024-7039

In open-webui/open-webui version v0.3.8, there is an improper privilege management vulnerability. The application allows an attacker, acting as an admin, to delete other administrators via the API endpoint http://0.0.0.0:8080/api/v1/users/{uuid_administrator}. This action is restricted by the user ...

8.3CVSS6.9AI score0.00065EPSS
CVE
CVE
added 2024/04/16 3:15 p.m.51 views

CVE-2024-30256

Open WebUI is a user-friendly WebUI for LLMs. Open-webui is vulnerable to authenticated blind server-side request forgery. This vulnerability is fixed in 0.1.117.

6.4CVSS6.5AI score0.00172EPSS
CVE
CVE
added 2024/08/07 11:15 p.m.44 views

CVE-2024-6706

Attackers can craft a malicious prompt that coerces the language model into executing arbitrary JavaScript in the context of the web page.

6.3CVSS6.6AI score0.00048EPSS
CVE
CVE
added 2025/05/05 7:15 p.m.43 views

CVE-2025-46571

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.6.6, low privileged users can upload HTML files which contain JavaScript code via the /api/v1/files/ backend endpoint. This endpoint returns a file id, which can be used to open the...

6.3CVSS6.4AI score0.0004EPSS
CVE
CVE
added 2025/05/05 7:15 p.m.41 views

CVE-2025-46719

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.6.6, a vulnerability in the way certain html tags in chat messages are rendered allows attackers to inject JavaScript code into a chat transcript. The JavaScript code will be execut...

6.4CVSS6.5AI score0.0006EPSS
CVE
CVE
added 2024/10/09 7:15 p.m.38 views

CVE-2024-7038

An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides different error messages based on the existence ...

2.7CVSS3.2AI score0.00076EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.37 views

CVE-2024-12534

In version v0.3.32 of open-webui/open-webui, the application allows users to submit large payloads in the email and password fields during the sign-in process due to the lack of character length validation on these inputs. This vulnerability can lead to a Denial of Service (DoS) condition when a us...

7.5CVSS7AI score0.00432EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.37 views

CVE-2024-7053

A vulnerability in open-webui/open-webui version 0.3.8 allows an attacker with a user-level account to perform a session fixation attack. The session cookie for all users is set with the default SameSite=Lax and does not have the Secure flag enabled, allowing the session cookie to be sent over HTTP...

9CVSS7.9AI score0.00126EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.37 views

CVE-2024-7806

A vulnerability in open-webui/open-webui versions <= 0.3.8 allows remote code execution by non-admin users via Cross-Site Request Forgery (CSRF). The application uses cookies with the SameSite attribute set to lax for authentication and lacks CSRF tokens. This allows an attacker to craft a malic...

8.8CVSS8.5AI score0.00245EPSS
CVE
CVE
added 2025/04/21 5:15 p.m.36 views

CVE-2025-29446

open-webui v0.5.16 is vulnerable to SSRF in routers/ollama.py in function verify_connection.

3.3CVSS7.1AI score0.00016EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-7036

A vulnerability in open-webui/open-webui v0.3.8 allows an unauthenticated attacker to sign up with excessively large text in the 'name' field, causing the Admin panel to become unresponsive. This prevents administrators from performing essential user management actions such as deleting, editing, or...

7.5CVSS7.4AI score0.00195EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-7040

In version v0.3.8 of open-webui/open-webui, there is an improper access control vulnerability. On the frontend admin page, administrators are intended to view only the chats of non-admin members. However, by modifying the user_id parameter, it is possible to view the chats of any administrator, inc...

4.9CVSS5.2AI score0.00053EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-7959

The /openai/models endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and return the output. This vulnerability allows the a...

7.7CVSS7.8AI score0.00091EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-7983

In version 0.3.8 of open-webui, an endpoint for converting markdown to HTML is exposed without authentication. A maliciously crafted markdown payload can cause the server to spend excessive time converting it, leading to a denial of service. The server becomes unresponsive to other requests until t...

7.5CVSS7.4AI score0.00432EPSS
CVE
CVE
added 2024/10/10 8:15 a.m.30 views

CVE-2024-7049

In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. This allows the user to perform actions without admin confirmation, bypassing the intended approval process.

5.4CVSS5.4AI score0.00074EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.28 views

CVE-2024-8017

An XSS vulnerability exists in open-webui/open-webui versions <= 0.3.8, specifically in the function that constructs the HTML for tooltips. This vulnerability allows attackers to perform operations with the victim's privileges, such as stealing chat history, deleting chats, and escalating their ...

9CVSS8.7AI score0.00077EPSS