In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.
References
Link | Resource |
---|---|
https://huntr.com/bounties/7078261f-8414-4bb7-9d72-a2a4d8bfd5d1 | Exploit Third Party Advisory |
Configurations
History
29 Jul 2025, 18:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://huntr.com/bounties/7078261f-8414-4bb7-9d72-a2a4d8bfd5d1 - Exploit, Third Party Advisory | |
First Time |
Openwebui open Webui
Openwebui |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-29 18:07
NVD link : CVE-2024-7033
Mitre link : CVE-2024-7033
CVE.ORG link : CVE-2024-7033
JSON object : View
Products Affected
openwebui
- open_webui
CWE
CWE-29
Path Traversal: '\..\filename'