Lucene search

K

8 matches found

CVE
CVE
added 2024/08/07 11:15 p.m.65 views

CVE-2024-6707

Attacker controlled files can be uploaded to arbitrary locations on the web server's filesystem by abusing a path traversal vulnerability.

8.8CVSS6.7AI score0.00123EPSS
CVE
CVE
added 2024/10/09 8:15 p.m.65 views

CVE-2024-7037

In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code...

7.2CVSS7AI score0.02033EPSS
Web
CVE
CVE
added 2024/10/10 2:15 a.m.65 views

CVE-2024-7048

In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulne...

6.3CVSS6.3AI score0.00085EPSS
CVE
CVE
added 2024/10/09 8:15 p.m.60 views

CVE-2024-7041

An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the API endpoint http://0.0.0.0:3000/api/v1/memories/{id}/update, where the decentralization design is flawed, allowing attackers to edit other users' memories withou...

6.5CVSS6.4AI score0.00086EPSS
Web
CVE
CVE
added 2024/04/16 3:15 p.m.53 views

CVE-2024-30256

Open WebUI is a user-friendly WebUI for LLMs. Open-webui is vulnerable to authenticated blind server-side request forgery. This vulnerability is fixed in 0.1.117.

6.4CVSS6.5AI score0.00234EPSS
CVE
CVE
added 2024/08/07 11:15 p.m.45 views

CVE-2024-6706

Attackers can craft a malicious prompt that coerces the language model into executing arbitrary JavaScript in the context of the web page.

6.3CVSS6.6AI score0.00077EPSS
CVE
CVE
added 2024/10/09 7:15 p.m.40 views

CVE-2024-7038

An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides different error messages based on the existence ...

2.7CVSS3.2AI score0.00096EPSS
CVE
CVE
added 2024/10/10 8:15 a.m.31 views

CVE-2024-7049

In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. This allows the user to perform actions without admin confirmation, bypassing the intended approval process.

5.4CVSS5.4AI score0.00095EPSS