Cross-Site Request Forgery Risk in Open-WebUI by Open-WebUI Team
CVE-2024-7035

6.9MEDIUM

Key Information:

Vendor
Open-webui
Vendor
CVE Published:
20 March 2025

Summary

In version v0.3.8 of Open-WebUI, sensitive actions like deletion and resets are executed using the GET method, exposing users to Cross-Site Request Forgery (CSRF) risks. This security flaw allows attackers to trigger these sensitive operations without user consent, simply by tricking users into visiting a malicious webpage or through unintended top-level navigation. The endpoints impacted include /rag/api/v1/reset, /rag/api/v1/reset/db, /api/v1/memories/reset, and /rag/api/v1/reset/uploads, which jeopardizes both the availability and integrity of the application.

Affected Version(s)

open-webui/open-webui <= unspecified

References

CVSS V3.0

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.