In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without proper input validation or sanitization. An attacker can exploit this by manipulating the `file.filename` parameter to include directory traversal sequences, causing the resulting `file_path` to escape the intended `UPLOAD_DIR` and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution.
References
Link | Resource |
---|---|
https://huntr.com/bounties/711beada-10fe-4567-9278-80a689da8613 | Exploit Third Party Advisory |
Configurations
History
29 Jul 2025, 18:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/711beada-10fe-4567-9278-80a689da8613 - Exploit, Third Party Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
First Time |
Openwebui open Webui
Openwebui |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-29 18:06
NVD link : CVE-2024-7034
Mitre link : CVE-2024-7034
CVE.ORG link : CVE-2024-7034
JSON object : View
Products Affected
openwebui
- open_webui
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')