logo

CVE-2024-12537 open-webui

Package

Manager: npm
Name: open-webui
Vulnerable Version: >=0 <=0.3.32 || >=0 <=0.3.32

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00379 pctl0.58591

Details

Open WebUI Uncontrolled Resource Consumption vulnerability In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unresponsive. This could lead to severe performance issues, causing the server to become unresponsive or experience significant degradation, ultimately resulting in service interruptions for legitimate users.

Metadata

Created: 2025-03-20T12:32:43Z
Modified: 2025-03-21T17:29:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-chf7-q7m5-fq92/GHSA-chf7-q7m5-fq92.json
CWE IDs: ["CWE-400", "CWE-770"]
Alternative ID: GHSA-chf7-q7m5-fq92
Finding: F067
Auto approve: 1