Improper Access Control in open-webui/open-webui
Description
An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all files uploaded by users, which includes the ID values. The attacker can then use the GET /api/v1/files/{file_id} interface to obtain information on any file and the DELETE /api/v1/files/{file_id} interface to delete any file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Improper access control in open-webui v0.3.8 allows any attacker to view and delete all user files via unauthenticated API calls.
Root
Cause
CVE-2024-7043 is an improper access control vulnerability in open-webui/open-webui v0.3.8 [1][2]. The application fails to verify whether the requesting user is an administrator when handling file-related API endpoints. This oversight means that no authentication or privilege check is enforced for critical operations on user-uploaded files [2].
Exploitation
An attacker can directly call the GET /api/v1/files/ interface to retrieve a list of all uploaded files, including their unique identifiers (file_id values) [2]. Armed with those IDs, the same attacker can then use GET /api/v1/files/{file_id} to read the contents of any file and DELETE /api/v1/files/{file_id} to delete any file [2]. No special network position or authentication is required; the attack is accessible to any party that can reach the application's API [2].
Impact
Successful exploitation gives an unauthenticated attacker complete read and write access to all user-uploaded files stored in the platform [2]. This includes any sensitive documents, images, or data that users have shared through the AI interface. An attacker could exfiltrate confidential information or permanently destroy user data, potentially leading to data loss and privacy breaches [2].
Mitigation
The vulnerability has been publicly disclosed via Huntr [3]. Users of open-webui must update to a version newer than v0.3.8 that implements proper authorization checks on the file API endpoints [2][3]. As of the publication date, no official patch version has been confirmed, but the maintainer repository is actively developed [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
open-webuiPyPI | <= 0.3.8 | — |
Affected products
3- Range: <=0.3.8
- open-webui/open-webui/open-webuiv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.