VYPR
Moderate severityNVD Advisory· Published Mar 20, 2025· Updated Oct 15, 2025

Improper Access Control in open-webui/open-webui

CVE-2024-7045

Description

In version v0.3.8 of open-webui/open-webui, improper access control vulnerabilities allow an attacker to view any prompts. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/prompts/ interface to retrieve all prompt information created by the admin, which includes the ID values. Subsequently, the attacker can exploit the /api/v1/prompts/command/{command_id} interface to obtain arbitrary prompt information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Open WebUI v0.3.8 fails to enforce admin-only access on the /api/v1/prompts/ endpoint, allowing any unauthenticated attacker to read all system prompts.

Vulnerability

Overview

CVE-2024-7045 is an improper access control vulnerability in Open WebUI version 0.3.8, a self-hosted AI interface platform [1]. The application fails to verify whether the requester is an administrator when accessing the /api/v1/prompts/ endpoint. This allows an attacker to directly call that interface and retrieve all prompt information created by the admin, including the unique ID values for each prompt [2].

Exploitation

Requirements

The attack requires no authentication or special privileges. An attacker simply sends an HTTP request to the /api/v1/prompts/ endpoint. Once the IDs are obtained, the attacker can then call /api/v1/prompts/command/{command_id} for any discovered ID, retrieving the full content of arbitrary prompts [2]. No network position beyond standard HTTP access to the Open WebUI instance is needed.

Impact

Successful exploitation results in complete disclosure of all prompts created by the administrator. Depending on the content of those prompts, this could expose sensitive system instructions, application logic, internal data, or user information managed by the platform [2]. The attacker does not need to be an authenticated user to achieve this.

Mitigation

As of the latest references, Open WebUI v0.3.8 is the affected version [1][2]. Users should upgrade to a patched version as soon as one becomes available. The advisory from the Huntr bounty platform indicates that this vulnerability was reported and tracked, but no patch version is explicitly mentioned in the provided references [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
open-webuiPyPI
<= 0.3.8

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.