Improper Privilege Management in open-webui/open-webui
Description
In open-webui/open-webui version v0.3.8, there is an improper privilege management vulnerability. The application allows an attacker, acting as an admin, to delete other administrators via the API endpoint http://0.0.0.0:8080/api/v1/users/{uuid_administrator}. This action is restricted by the user interface but can be performed through direct API calls.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An improper privilege management vulnerability in open-webui v0.3.8 allows an admin to delete other admins via direct API calls despite UI restrictions.
Vulnerability
Overview
CVE-2024-7039 is an improper privilege management vulnerability in open-webui version v0.3.8. The application exposes an API endpoint at http://0.0.0.0:8080/api/v1/users/{uuid_administrator} that does not enforce the privilege checks present in the user interface. An authenticated attacker with administrator privileges can send a direct API call to this endpoint to delete other administrator accounts, an action that the UI would normally restrict [2][3].
Exploitation
Exploitation requires the attacker to already possess an admin-level account on the Open WebUI instance. No additional authentication bypass is needed. The attack is performed by sending a crafted HTTP request (e.g., DELETE) to the vulnerable endpoint with the UUID of the target admin. Because the API lacks the same privilege validation as the web interface, the deletion succeeds even though the user interface would have blocked it [2].
Impact
A malicious admin can remove other administrators, effectively seizing full control of the Open WebUI deployment. This could lead to unauthorized changes to AI models, data, or configurations, and potentially lock out legitimate administrators. The vulnerability is especially dangerous in multi-tenant or organizational deployments where admin accounts are shared [2].
Mitigation
The vulnerability affects version 0.3.8; users should upgrade to a patched version (if available) following official updates from the project repository [1]. There is no public mention of a workaround. Organizations should review access to admin accounts and monitor API logs for unusual DELETE requests targeting user endpoints.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
open-webuiPyPI | <= 0.3.8 | — |
Affected products
3- Range: = v0.3.8
- open-webui/open-webui/open-webuiv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.