VYPR
High severityNVD Advisory· Published Mar 20, 2025· Updated Oct 15, 2025

Improper Access Control in open-webui/open-webui

CVE-2024-7043

Description

An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all files uploaded by users, which includes the ID values. The attacker can then use the GET /api/v1/files/{file_id} interface to obtain information on any file and the DELETE /api/v1/files/{file_id} interface to delete any file.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Improper access control in open-webui v0.3.8 allows any attacker to view and delete all user files via unauthenticated API calls.

Root

Cause

CVE-2024-7043 is an improper access control vulnerability in open-webui/open-webui v0.3.8 [1][2]. The application fails to verify whether the requesting user is an administrator when handling file-related API endpoints. This oversight means that no authentication or privilege check is enforced for critical operations on user-uploaded files [2].

Exploitation

An attacker can directly call the GET /api/v1/files/ interface to retrieve a list of all uploaded files, including their unique identifiers (file_id values) [2]. Armed with those IDs, the same attacker can then use GET /api/v1/files/{file_id} to read the contents of any file and DELETE /api/v1/files/{file_id} to delete any file [2]. No special network position or authentication is required; the attack is accessible to any party that can reach the application's API [2].

Impact

Successful exploitation gives an unauthenticated attacker complete read and write access to all user-uploaded files stored in the platform [2]. This includes any sensitive documents, images, or data that users have shared through the AI interface. An attacker could exfiltrate confidential information or permanently destroy user data, potentially leading to data loss and privacy breaches [2].

Mitigation

The vulnerability has been publicly disclosed via Huntr [3]. Users of open-webui must update to a version newer than v0.3.8 that implements proper authorization checks on the file API endpoints [2][3]. As of the publication date, no official patch version has been confirmed, but the maintainer repository is actively developed [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
open-webuiPyPI
<= 0.3.8

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.