In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
                
            References
                    | Link | Resource | 
|---|---|
| https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 | Exploit Third Party Advisory | 
Configurations
                    History
                    29 Jul 2025, 18:47
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Openwebui Openwebui open Webui | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.2 | 
| References | () https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:* | 
10 Oct 2024, 12:51
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
09 Oct 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-10-09 20:15
Updated : 2025-07-29 18:47
NVD link : CVE-2024-7037
Mitre link : CVE-2024-7037
CVE.ORG link : CVE-2024-7037
JSON object : View
Products Affected
                openwebui
- open_webui
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
