logo

CVE-2024-8060 open-webui

Package

Manager: pip
Name: open-webui
Vulnerable Version: >=0 <0.5.17

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00301 pctl0.52866

Details

Open WebUI allows Remote Code Execution via Arbitrary File Upload to /audio/api/v1/transcriptions OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint `/audio/api/v1/transcriptions` that allows for arbitrary file upload. The application performs insufficient validation on the `file.content_type` and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.

Metadata

Created: 2025-03-20T12:32:47Z
Modified: 2025-03-21T21:24:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-ff5c-56m7-vc75/GHSA-ff5c-56m7-vc75.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-ff5c-56m7-vc75
Finding: F027
Auto approve: 1