Vulnerability in open-webui/open-webui Allows Arbitrary File Write and Delete, Potentially Leading to Remote Code Execution
CVE-2024-7037

7.2HIGH

Key Information:

Vendor

Open-webui

Vendor
CVE Published:
9 October 2024

What is CVE-2024-7037?

The Open-WebUI application v0.3.8 is susceptible to an arbitrary file write and delete vulnerability due to insufficient sanitization of file inputs. Specifically, the vulnerable endpoint at /api/pipelines/upload allows for the unvalidated concatenation of uploaded file names with a sensitive system directory, CACHE_DIR. This flaw could enable adversaries to overwrite existing files or delete critical system files, which could allow for broader exploitation, including potential remote code execution.

Affected Version(s)

open-webui/open-webui <= unspecified

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.
CVE-2024-7037 : Vulnerability in open-webui/open-webui Allows Arbitrary File Write and Delete, Potentially Leading to Remote Code Execution