Lucene search

K

19 matches found

CVE
CVE
added 2025/03/20 10:15 a.m.66 views

CVE-2024-8053

In version v0.3.10 of open-webui/open-webui, the api/v1/utils/pdf endpoint lacks authentication mechanisms, allowing unauthenticated attackers to access the PDF generation service. This vulnerability can be exploited by sending a POST request with an excessively large payload, potentially leading t...

8.2CVSS7.5AI score0.00695EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.65 views

CVE-2024-12537

In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the api/v1/utils/code/format endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unrespon...

7.5CVSS7.7AI score0.0046EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.64 views

CVE-2024-7046

An improper access control vulnerability in open-webui/open-webui v0.3.8 allows an attacker to view admin details. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/auths/admin/details interface to retrieve the first admin (...

4.3CVSS6.8AI score0.0005EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.62 views

CVE-2024-7035

In version v0.3.8 of open-webui/open-webui, sensitive actions such as deleting and resetting are performed using the GET method. This vulnerability allows an attacker to perform Cross-Site Request Forgery (CSRF) attacks, where an unaware user can unintentionally perform sensitive actions by simply ...

6.9CVSS6.8AI score0.00028EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.62 views

CVE-2024-7043

An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all fi...

8.8CVSS7.8AI score0.00043EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.62 views

CVE-2024-7990

A stored cross-site scripting (XSS) vulnerability exists in open-webui/open-webui version 0.3.8. The vulnerability is present in the /api/v1/models/add endpoint, where the model description field is improperly sanitized before being rendered in chat. This allows an attacker to inject malicious scri...

8.4CVSS7.6AI score0.00096EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.61 views

CVE-2024-7045

In version v0.3.8 of open-webui/open-webui, improper access control vulnerabilities allow an attacker to view any prompts. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/prompts/ interface to retrieve all prompt informati...

4.3CVSS4.9AI score0.0005EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.58 views

CVE-2024-7039

In open-webui/open-webui version v0.3.8, there is an improper privilege management vulnerability. The application allows an attacker, acting as an admin, to delete other administrators via the API endpoint http://0.0.0.0:8080/api/v1/users/{uuid_administrator}. This action is restricted by the user ...

8.3CVSS6.9AI score0.00065EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.39 views

CVE-2024-7034

In open-webui version 0.3.8, the endpoint /models/upload is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of file_path = f"{UPLOAD_DIR}/{file.filename}" without proper input validation or sanitization. An attacker can...

7.2CVSS6.9AI score0.02581EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.37 views

CVE-2024-12534

In version v0.3.32 of open-webui/open-webui, the application allows users to submit large payloads in the email and password fields during the sign-in process due to the lack of character length validation on these inputs. This vulnerability can lead to a Denial of Service (DoS) condition when a us...

7.5CVSS7AI score0.00432EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.37 views

CVE-2024-7044

A Stored Cross-Site Scripting (XSS) vulnerability exists in the chat file upload functionality of open-webui/open-webui version 0.3.8. An attacker can inject malicious content into a file, which, when accessed by a victim through a URL or shared chat, executes JavaScript in the victim's browser. Th...

8.9CVSS5.9AI score0.00233EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.37 views

CVE-2024-7053

A vulnerability in open-webui/open-webui version 0.3.8 allows an attacker with a user-level account to perform a session fixation attack. The session cookie for all users is set with the default SameSite=Lax and does not have the Secure flag enabled, allowing the session cookie to be sent over HTTP...

9CVSS7.9AI score0.00126EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.37 views

CVE-2024-7806

A vulnerability in open-webui/open-webui versions

8.8CVSS8.5AI score0.00245EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-7033

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's fil...

7.2CVSS8.3AI score0.00517EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-7036

A vulnerability in open-webui/open-webui v0.3.8 allows an unauthenticated attacker to sign up with excessively large text in the 'name' field, causing the Admin panel to become unresponsive. This prevents administrators from performing essential user management actions such as deleting, editing, or...

7.5CVSS7.4AI score0.00195EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-7040

In version v0.3.8 of open-webui/open-webui, there is an improper access control vulnerability. On the frontend admin page, administrators are intended to view only the chats of non-admin members. However, by modifying the user_id parameter, it is possible to view the chats of any administrator, inc...

4.9CVSS5.2AI score0.00053EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-7959

The /openai/models endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and return the output. This vulnerability allows the a...

7.7CVSS7.8AI score0.00091EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-7983

In version 0.3.8 of open-webui, an endpoint for converting markdown to HTML is exposed without authentication. A maliciously crafted markdown payload can cause the server to spend excessive time converting it, leading to a denial of service. The server becomes unresponsive to other requests until t...

7.5CVSS7.4AI score0.00432EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.28 views

CVE-2024-8017

An XSS vulnerability exists in open-webui/open-webui versions

9CVSS8.7AI score0.00077EPSS