Lucene search

K
OpenwebuiOpen Webui

8 matches found

CVE
CVE
added 2025/03/20 10:15 a.m.66 views

CVE-2024-12537

In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the api/v1/utils/code/format endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unrespon...

7.5CVSS7.7AI score0.00329EPSS
CVE
CVE
added 2024/10/09 8:15 p.m.64 views

CVE-2024-7037

In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code...

7.2CVSS7AI score0.02033EPSS
Web
CVE
CVE
added 2025/03/20 10:15 a.m.39 views

CVE-2024-7034

In open-webui version 0.3.8, the endpoint /models/upload is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of file_path = f"{UPLOAD_DIR}/{file.filename}" without proper input validation or sanitization. An attacker can...

7.2CVSS6.9AI score0.01425EPSS
Web
CVE
CVE
added 2025/03/20 10:15 a.m.37 views

CVE-2024-12534

In version v0.3.32 of open-webui/open-webui, the application allows users to submit large payloads in the email and password fields during the sign-in process due to the lack of character length validation on these inputs. This vulnerability can lead to a Denial of Service (DoS) condition when a us...

7.5CVSS7AI score0.00273EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-7033

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's fil...

7.2CVSS8.3AI score0.00451EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-7036

A vulnerability in open-webui/open-webui v0.3.8 allows an unauthenticated attacker to sign up with excessively large text in the 'name' field, causing the Admin panel to become unresponsive. This prevents administrators from performing essential user management actions such as deleting, editing, or...

7.5CVSS7.4AI score0.00144EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-7959

The /openai/models endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and return the output. This vulnerability allows the a...

7.7CVSS7.8AI score0.00059EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.34 views

CVE-2024-7983

In version 0.3.8 of open-webui, an endpoint for converting markdown to HTML is exposed without authentication. A maliciously crafted markdown payload can cause the server to spend excessive time converting it, leading to a denial of service. The server becomes unresponsive to other requests until t...

7.5CVSS7.4AI score0.00273EPSS