Cross-Site Request Forgery Risk in Open-WebUI by Open-WebUI Team
CVE-2024-7035
6.9MEDIUM
Summary
In version v0.3.8 of Open-WebUI, sensitive actions like deletion and resets are executed using the GET method, exposing users to Cross-Site Request Forgery (CSRF) risks. This security flaw allows attackers to trigger these sensitive operations without user consent, simply by tricking users into visiting a malicious webpage or through unintended top-level navigation. The endpoints impacted include /rag/api/v1/reset, /rag/api/v1/reset/db, /api/v1/memories/reset, and /rag/api/v1/reset/uploads, which jeopardizes both the availability and integrity of the application.
Affected Version(s)
open-webui/open-webui <= unspecified
References
CVSS V3.0
Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved