VYPR
High severityNVD Advisory· Published Mar 20, 2025· Updated Mar 27, 2025

Improper Authentication in open-webui/open-webui

CVE-2024-8053

Description

In version v0.3.10 of open-webui/open-webui, the api/v1/utils/pdf endpoint lacks authentication mechanisms, allowing unauthenticated attackers to access the PDF generation service. This vulnerability can be exploited by sending a POST request with an excessively large payload, potentially leading to server resource exhaustion and denial of service (DoS). Additionally, unauthorized users can misuse the endpoint to generate PDFs without verification, resulting in service misuse and potential operational and financial impacts.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Open WebUI v0.3.10's PDF generation endpoint lacks authentication, enabling unauthenticated DoS via large payloads and service misuse.

Vulnerability

Overview

CVE-2024-8053 affects open-webui version v0.3.10, specifically the /api/v1/utils/pdf endpoint. This endpoint is designed to generate PDFs but does not enforce any authentication mechanism, allowing any unauthenticated user to send requests to it [1][2]. The root cause is the absence of access controls on this API route, which is exposed without verification of the requester's identity or authorization.

Exploitation

Prerequisites

An attacker can exploit this vulnerability by sending a POST request to the endpoint with an excessively large payload. No prior authentication or network position is required; the endpoint is accessible over the network if the service is reachable [2]. The lack of authentication means that any user who can reach the server can trigger the PDF generation service, potentially leading to server resource exhaustion and denial of service (DoS) [2][3].

Impact

Successful exploitation can result in two primary impacts. First, sending a large payload can overwhelm server resources, causing a denial of service that affects legitimate users. Second, unauthorized users can misuse the endpoint to generate PDFs without any verification, leading to service misuse and potential operational and financial impacts, such as increased compute costs or abuse of the service for spam [2][3].

Mitigation

Status

As of the publication date (2025-03-20), the vulnerability is present in version v0.3.10. Users are advised to upgrade to a patched version if available, or implement access controls (e.g., authentication middleware) on the /api/v1/utils/pdf endpoint. The vendor's GitHub repository [1] and the Huntr bounty page [3] provide additional context and potential updates.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
open-webuiPyPI
<= 0.3.10

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.