VYPR

PyPI package

open-webui

pkg:pypi/open-webui

Vulnerabilities (31)

  • CVE-2024-7035Mar 20, 2025
    affected <= 0.3.8

    In version v0.3.8 of open-webui/open-webui, sensitive actions such as deleting and resetting are performed using the GET method. This vulnerability allows an attacker to perform Cross-Site Request Forgery (CSRF) attacks, where an unaware user can unintentionally perform sensitive

  • CVE-2024-7036Mar 20, 2025
    affected <= 0.3.8

    A vulnerability in open-webui/open-webui v0.3.8 allows an unauthenticated attacker to sign up with excessively large text in the 'name' field, causing the Admin panel to become unresponsive. This prevents administrators from performing essential user management actions such as de

  • CVE-2024-7033Mar 20, 2025
    affected <= 0.3.8

    In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations

  • CVE-2024-7046Mar 20, 2025
    affected <= 0.3.8

    An improper access control vulnerability in open-webui/open-webui v0.3.8 allows an attacker to view admin details. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/auths/admin/details interface to retriev

  • CVE-2024-12537Mar 20, 2025
    affected <= 0.3.32

    In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could becom

  • CVE-2024-7959Mar 20, 2025
    affected <= 0.3.8

    The `/openai/models` endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and return the output. This vulne

  • CVE-2024-7990Mar 20, 2025
    affected <= 0.3.8

    A stored cross-site scripting (XSS) vulnerability exists in open-webui/open-webui version 0.3.8. The vulnerability is present in the `/api/v1/models/add` endpoint, where the model description field is improperly sanitized before being rendered in chat. This allows an attacker to

  • CVE-2024-7041Oct 9, 2024
    affected <= 0.3.8

    An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the API endpoint `http://0.0.0.0:3000/api/v1/memories/{id}/update`, where the decentralization design is flawed, allowing attackers to edit other u

  • CVE-2024-7037Oct 9, 2024
    affected <= 0.3.8

    In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially lea

  • CVE-2024-7038Oct 9, 2024
    affected <= 0.3.8

    An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides different error messages base

  • CVE-2024-6706Aug 7, 2024
    affected <= 0.1.105

    Attackers can craft a malicious prompt that coerces the language model into executing arbitrary JavaScript in the context of the web page.

Page 2 of 2