An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all files uploaded by users, which includes the ID values. The attacker can then use the GET /api/v1/files/{file_id} interface to obtain information on any file and the DELETE /api/v1/files/{file_id} interface to delete any file.
References
Link | Resource |
---|---|
https://huntr.com/bounties/c01e0c7f-68d8-45cf-91d2-521c97f33b00 | Exploit Third Party Advisory |
Configurations
History
18 Jul 2025, 19:40
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://huntr.com/bounties/c01e0c7f-68d8-45cf-91d2-521c97f33b00 - Exploit, Third Party Advisory | |
First Time |
Openwebui open Webui
Openwebui |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-18 19:40
NVD link : CVE-2024-7043
Mitre link : CVE-2024-7043
CVE.ORG link : CVE-2024-7043
JSON object : View
Products Affected
openwebui
- open_webui
CWE
CWE-821
Incorrect Synchronization