CVE-2024-7037

In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
References
Link Resource
https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*

History

29 Jul 2025, 18:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 7.2
First Time Openwebui open Webui
Openwebui
CPE cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*
References () https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 - () https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 - Exploit, Third Party Advisory

Information

Published : 2024-10-09 20:15

Updated : 2025-07-29 18:47


NVD link : CVE-2024-7037

Mitre link : CVE-2024-7037

CVE.ORG link : CVE-2024-7037


JSON object : View

Products Affected

openwebui

  • open_webui
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')