Arbitrary File Write/Delete Leading to RCE in open-webui/open-webui
Description
In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Open WebUI v0.3.8's /api/pipelines/upload endpoint allows arbitrary file write/delete via unsanitized filename, enabling system file overwrite and potential RCE.
Vulnerability
Overview The /api/pipelines/upload endpoint in Open WebUI v0.3.8 is vulnerable to arbitrary file write and deletion due to insufficient sanitization of the file.filename parameter. The filename is concatenated directly with the CACHE_DIR path without proper validation, allowing path traversal sequences [1][2].
Exploitation
An attacker can craft a filename containing directory traversal characters (e.g., ../) to write or delete files outside the intended cache directory. This attack requires network access to the Open WebUI instance and the ability to send a POST request to the vulnerable endpoint. No authentication is explicitly required, but the endpoint may be protected by other means [2][3].
Impact
Successful exploitation enables an attacker to overwrite critical system files, such as configuration files or executables, potentially leading to remote code execution (RCE). The ability to delete files can also cause denial of service or disrupt application functionality [2][3].
Mitigation
As of the publication date, no official patch has been released for this vulnerability. Users of Open WebUI v0.3.8 should restrict access to the /api/pipelines/upload endpoint, implement strict input validation on filenames, or upgrade to a newer version if a fix becomes available [1][2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
open-webuiPyPI | <= 0.3.8 | — |
Affected products
2- open-webui/open-webui/open-webuiv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.