-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| open-webui | pip |
The vulnerability stems from the exposed /markdown endpoint handled by get_html_from_markdown. The code shows: 1) No authentication (no Depends(get_admin_user)), 2) Direct processing of raw user input via markdown.markdown(), 3) No concurrency limits or timeout mechanisms. The markdown library's processing time grows with input complexity, making this a textbook case of CWE-400 via uncontrolled resource consumption.
Ongoing coverage of React2Shell