In version v0.3.8 of open-webui/open-webui, improper access control vulnerabilities allow an attacker to view any prompts. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/prompts/ interface to retrieve all prompt information created by the admin, which includes the ID values. Subsequently, the attacker can exploit the /api/v1/prompts/command/{command_id} interface to obtain arbitrary prompt information.
References
| Link | Resource |
|---|---|
| https://huntr.com/bounties/03ea0826-af7b-4717-b63e-90fd19675ab2 | Exploit Third Party Advisory |
Configurations
History
15 Oct 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-862 |
29 Jul 2025, 18:05
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:* | |
| First Time |
Openwebui open Webui
Openwebui |
|
| References | () https://huntr.com/bounties/03ea0826-af7b-4717-b63e-90fd19675ab2 - Exploit, Third Party Advisory |
20 Mar 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-10-15 13:15
NVD link : CVE-2024-7045
Mitre link : CVE-2024-7045
CVE.ORG link : CVE-2024-7045
JSON object : View
Products Affected
openwebui
- open_webui
CWE
CWE-862
Missing Authorization
