In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
References
| Link | Resource |
|---|---|
| https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 | Exploit Third Party Advisory |
Configurations
History
29 Jul 2025, 18:47
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| First Time |
Openwebui open Webui
Openwebui |
|
| CPE | cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:* | |
| References | () https://huntr.com/bounties/8508db68-9c99-4b1c-828c-e1bfcacfb847 - Exploit, Third Party Advisory |
Information
Published : 2024-10-09 20:15
Updated : 2025-07-29 18:47
NVD link : CVE-2024-7037
Mitre link : CVE-2024-7037
CVE.ORG link : CVE-2024-7037
JSON object : View
Products Affected
openwebui
- open_webui
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
