First published: Thu Mar 20 2025(Updated: )
An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all files uploaded by users, which includes the ID values. The attacker can then use the GET /api/v1/files/{file_id} interface to obtain information on any file and the DELETE /api/v1/files/{file_id} interface to delete any file.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
open-webui | ||
pip/open-webui | <=0.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7043 is considered a high severity vulnerability due to its potential to allow unauthorized access to sensitive files.
To fix CVE-2024-7043, update to the latest version of open-webui that includes access control checks.
CVE-2024-7043 affects the open-webui application version 0.3.8 and earlier.
CVE-2024-7043 is an improper access control vulnerability that allows attackers to view and delete files.
Attackers can exploit CVE-2024-7043 by calling the GET /api/v1/files/ interface without proper verification of their admin status.