In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
References
Link | Resource |
---|---|
https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 | Exploit Third Party Advisory |
Configurations
History
29 Jul 2025, 18:47
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openwebui
Openwebui open Webui |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
References | () https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:* |
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Oct 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 20:15
Updated : 2025-07-29 18:47
NVD link : CVE-2024-7037
Mitre link : CVE-2024-7037
CVE.ORG link : CVE-2024-7037
JSON object : View
Products Affected
openwebui
- open_webui
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')