CVE-2024-7037

In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
References
Link Resource
https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*

History

29 Jul 2025, 18:47

Type Values Removed Values Added
First Time Openwebui
Openwebui open Webui
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 7.2
References () https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 - () https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 - Exploit, Third Party Advisory
CPE cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*

10 Oct 2024, 12:51

Type Values Removed Values Added
Summary
  • (es) En la versión v0.3.8 de open-webui/open-webui, el endpoint /api/pipelines/upload es vulnerable a la escritura y eliminación arbitrarias de archivos debido a la concatenación no saneada de file.filename con CACHE_DIR. Esta vulnerabilidad permite a los atacantes sobrescribir y eliminar archivos del sistema, lo que puede provocar la ejecución remota de código.

09 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-09 20:15

Updated : 2025-07-29 18:47


NVD link : CVE-2024-7037

Mitre link : CVE-2024-7037

CVE.ORG link : CVE-2024-7037


JSON object : View

Products Affected

openwebui

  • open_webui
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')