CVE-2024-7033
HIGHOpenwebui Open Webui - Remote Code Execution
Title source: ruleDescription
In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.
Scores
CVSS v3
7.2
EPSS
0.0116
EPSS Percentile
78.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-29
Status
published
Affected Products (2)
openwebui/open_webui
pypi/open-webui
PyPI
Timeline
Published
Mar 20, 2025
Tracked Since
Feb 18, 2026