First published: Thu Mar 20 2025(Updated: )
A vulnerability in open-webui/open-webui versions <= 0.3.8 allows remote code execution by non-admin users via Cross-Site Request Forgery (CSRF). The application uses cookies with the SameSite attribute set to lax for authentication and lacks CSRF tokens. This allows an attacker to craft a malicious HTML that, when accessed by a victim, can modify the Python code of an existing pipeline and execute arbitrary code with the victim's privileges.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
open-webui | <=0.3.8 | |
pip/open-webui | <0.3.33 | 0.3.33 |
OpenWrt libuci | <=0.3.8 | |
<=0.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7806 is classified as a critical vulnerability due to its capability to allow remote code execution.
To fix CVE-2024-7806, upgrade open-webui to version 0.3.9 or later, which implements CSRF tokens and adjusts cookie attributes.
CVE-2024-7806 affects all users of open-webui versions 0.3.8 and earlier.
CVE-2024-7806 can facilitate remote code execution attacks, allowing attackers to execute arbitrary code on the server.
Yes, there are known exploits for CVE-2024-7806 that leverage the CSRF vulnerabilities to execute unauthorized commands.