CVE-2024-7033 – open-webui
Package
Manager: pip
Name: open-webui
Vulnerable Version: >=0 <=0.3.8
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00502 pctl0.65058
Details
Open WebUI Allows Arbitrary File Write via the `download_model` Endpoint In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.
Metadata
Created: 2025-03-20T12:32:45Z
Modified: 2025-03-21T17:30:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-3p9q-7w63-3f8q/GHSA-3p9q-7w63-3f8q.json
CWE IDs: ["CWE-29"]
Alternative ID: GHSA-3p9q-7w63-3f8q
Finding: F184
Auto approve: 1