Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2024-7049

Disclosure Date: October 10, 2024 (last updated October 18, 2024)
In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. This allows the user to perform actions without admin confirmation, bypassing the intended approval process.
Attacker Value
Unknown

CVE-2024-7048

Disclosure Date: October 10, 2024 (last updated October 10, 2024)
In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models.
0
Attacker Value
Unknown

CVE-2024-7041

Disclosure Date: October 09, 2024 (last updated October 10, 2024)
An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the API endpoint `http://0.0.0.0:3000/api/v1/memories/{id}/update`, where the decentralization design is flawed, allowing attackers to edit other users' memories without proper authorization.
0
Attacker Value
Unknown

CVE-2024-7037

Disclosure Date: October 09, 2024 (last updated October 10, 2024)
In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
0
Attacker Value
Unknown

CVE-2024-7038

Disclosure Date: October 09, 2024 (last updated October 16, 2024)
An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides different error messages based on the existence and configuration of the file. This behavior allows an attacker to enumerate file names and traverse directories by observing the error messages, leading to potential exposure of sensitive information.
Attacker Value
Unknown

CVE-2024-6707

Disclosure Date: August 07, 2024 (last updated August 09, 2024)
Attacker controlled files can be uploaded to arbitrary locations on the web server's filesystem by abusing a path traversal vulnerability.
Attacker Value
Unknown

CVE-2024-6706

Disclosure Date: August 07, 2024 (last updated August 09, 2024)
Attackers can craft a malicious prompt that coerces the language model into executing arbitrary JavaScript in the context of the web page.
Attacker Value
Unknown

CVE-2024-30256

Disclosure Date: April 16, 2024 (last updated April 17, 2024)
Open WebUI is a user-friendly WebUI for LLMs. Open-webui is vulnerable to authenticated blind server-side request forgery. This vulnerability is fixed in 0.1.117.
0