In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unresponsive. This could lead to severe performance issues, causing the server to become unresponsive or experience significant degradation, ultimately resulting in service interruptions for legitimate users.
References
Configurations
History
04 Apr 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
01 Apr 2025, 20:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/edabd06c-acc0-428c-a481-271f333755bc - Exploit | |
CWE | CWE-770 | |
First Time |
Openwebui open Webui
Openwebui |
|
CPE | cpe:2.3:a:openwebui:open_webui:0.3.32:*:*:*:*:*:*:* | |
Summary |
|
20 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/edabd06c-acc0-428c-a481-271f333755bc - |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-04-04 09:15
NVD link : CVE-2024-12537
Mitre link : CVE-2024-12537
CVE.ORG link : CVE-2024-12537
JSON object : View
Products Affected
openwebui
- open_webui
CWE
CWE-770
Allocation of Resources Without Limits or Throttling