First published: Thu Mar 20 2025(Updated: )
The `/openai/models` endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and return the output. This vulnerability allows the attacker to access internal services and potentially gain command execution by accessing instance secrets.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
open-webui | ||
pip/open-webui | <=0.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7959 has a critical severity level due to its potential for enabling Server-Side Request Forgery (SSRF) attacks.
To fix CVE-2024-7959, you should upgrade to a version of open-webui newer than 0.3.8, where this vulnerability has been addressed.
CVE-2024-7959 is categorized as a Server-Side Request Forgery (SSRF) vulnerability.
An attacker can exploit CVE-2024-7959 to make requests to arbitrary URLs, potentially leading to data leakage or internal network attacks.
CVE-2024-7959 affects open-webui version 0.3.8 and earlier versions.