CVE-2024-7043 – open-webui
Package
Manager: pip
Name: open-webui
Vulnerable Version: >=0 <=0.3.8
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00033 pctl0.07796
Details
Open WebUI Allows Arbitrary File Reading and Deletion An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all files uploaded by users, which includes the ID values. The attacker can then use the GET /api/v1/files/{file_id} interface to obtain information on any file and the DELETE /api/v1/files/{file_id} interface to delete any file.
Metadata
Created: 2025-03-20T12:32:45Z
Modified: 2025-03-21T17:26:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-jrhc-9qg9-4qfq/GHSA-jrhc-9qg9-4qfq.json
CWE IDs: ["CWE-821"]
Alternative ID: GHSA-jrhc-9qg9-4qfq
Finding: F123
Auto approve: 1