CVE-2024-8060 – open-webui
Package
Manager: pip
Name: open-webui
Vulnerable Version: >=0 <0.5.17
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00301 pctl0.52866
Details
Open WebUI allows Remote Code Execution via Arbitrary File Upload to /audio/api/v1/transcriptions OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint `/audio/api/v1/transcriptions` that allows for arbitrary file upload. The application performs insufficient validation on the `file.content_type` and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.
Metadata
Created: 2025-03-20T12:32:47Z
Modified: 2025-03-21T21:24:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-ff5c-56m7-vc75/GHSA-ff5c-56m7-vc75.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-ff5c-56m7-vc75
Finding: F027
Auto approve: 1