VYPR
High severityNVD Advisory· Published Mar 20, 2025· Updated Oct 15, 2025

Denial of Service in open-webui/open-webui

CVE-2024-7983

Description

In version 0.3.8 of open-webui, an endpoint for converting markdown to HTML is exposed without authentication. A maliciously crafted markdown payload can cause the server to spend excessive time converting it, leading to a denial of service. The server becomes unresponsive to other requests until the conversion is complete.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Open-WebUI 0.3.8 exposes an unauthenticated markdown-to-HTML endpoint; a crafted payload can cause excessive processing, leading to denial of service.

Vulnerability

Analysis

CVE-2024-7983 affects Open-WebUI version 0.3.8, a self-hosted AI platform. The vulnerability resides in an endpoint for converting markdown to HTML, which is exposed without any authentication [2]. The root cause is that the server does not impose limits on the complexity or size of markdown payloads processed by this endpoint.

Exploitation

An attacker can send a maliciously crafted markdown payload to the unauthenticated endpoint. The server will spend excessive time converting this payload, causing it to become unresponsive to other legitimate requests until the conversion is complete [2]. No authentication or special network position is required; the attacker only needs network access to the vulnerable server.

Impact

Successful exploitation results in a denial of service (DoS) condition. The server is unable to handle any other requests during the prolonged conversion, effectively taking the service offline for the duration of the attack. This can disrupt all users of the Open-WebUI instance.

Mitigation

The vulnerability exists in version 0.3.8. Users are advised to upgrade to a patched version if available, or to apply rate limiting and input validation on the vulnerable endpoint. As of the publication date, the vendor repository [1] may contain fixes; the vulnerable code is located in backend/apps/webui/routers/utils.py [3]. Additional details are available on the Huntr bug bounty platform [4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
open-webuiPyPI
<= 0.3.8

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.