CVE-2024-7037: open-webui allows writing and deleting arbitrary files
6.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.76245%
CWE
Published
10/9/2024
Updated
10/9/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
open-webui | pip | <= 0.3.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the file upload handler referenced in GitHub's main.py
line 1513. The advisory explicitly states unsanitized filename
concatenation with CACHE_DIR
as the root cause. The code likely uses user-supplied filename
directly in os.path.join()
or similar file operations without normalization/sanitization checks. This matches the CWE-22 pattern where user-controlled filenames
can contain path traversal sequences (../../) to escape the restricted directory. The high confidence comes from multiple sources (GHSA, CVE, huntr) all pointing to this specific endpoint and code pattern.