VYPR
Moderate severityNVD Advisory· Published Oct 9, 2024· Updated Oct 10, 2024

Arbitrary File Write/Delete Leading to RCE in open-webui/open-webui

CVE-2024-7037

Description

In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Open WebUI v0.3.8's /api/pipelines/upload endpoint allows arbitrary file write/delete via unsanitized filename, enabling system file overwrite and potential RCE.

Vulnerability

Overview The /api/pipelines/upload endpoint in Open WebUI v0.3.8 is vulnerable to arbitrary file write and deletion due to insufficient sanitization of the file.filename parameter. The filename is concatenated directly with the CACHE_DIR path without proper validation, allowing path traversal sequences [1][2].

Exploitation

An attacker can craft a filename containing directory traversal characters (e.g., ../) to write or delete files outside the intended cache directory. This attack requires network access to the Open WebUI instance and the ability to send a POST request to the vulnerable endpoint. No authentication is explicitly required, but the endpoint may be protected by other means [2][3].

Impact

Successful exploitation enables an attacker to overwrite critical system files, such as configuration files or executables, potentially leading to remote code execution (RCE). The ability to delete files can also cause denial of service or disrupt application functionality [2][3].

Mitigation

As of the publication date, no official patch has been released for this vulnerability. Users of Open WebUI v0.3.8 should restrict access to the /api/pipelines/upload endpoint, implement strict input validation on filenames, or upgrade to a newer version if a fix becomes available [1][2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
open-webuiPyPI
<= 0.3.8

Affected products

2
  • ghsa-coords
    Range: <= 0.3.8
  • open-webui/open-webui/open-webuiv5
    Range: unspecified

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.