First published: Thu Mar 20 2025(Updated: )
OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint `/audio/api/v1/transcriptions` that allows for arbitrary file upload. The application performs insufficient validation on the `file.content_type` and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
OpenWebUI | ||
pip/open-webui | <0.5.17 | 0.5.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8060 is classified as a critical severity vulnerability due to its potential exploitation through arbitrary file uploads.
To address CVE-2024-8060, upgrade OpenWebUI to version 0.5.17 or later.
CVE-2024-8060 affects the audio API endpoint `/audio/api/v1/transcriptions` in OpenWebUI version 0.3.0.
Yes, CVE-2024-8060 could potentially allow for remote code execution due to the ability for arbitrary file upload.
CVE-2024-8060 does not apply to versions prior to 0.3.0, as it specifically affects version 0.3.0.