Product:

Open_webui

(Openwebui)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 4
Date Id Summary Products Score Patch Annotated
2024-10-10 CVE-2024-7049 In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. This allows the user to perform actions without admin confirmation, bypassing the intended approval process. Open_webui 5.4
2024-10-09 CVE-2024-7038 An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides different error messages based on the existence and configuration of the file. This behavior allows an attacker to enumerate file names and traverse directories by observing the error messages, leading to potential exposure of sensitive information. Open_webui 2.7
2024-08-07 CVE-2024-6707 Attacker controlled files can be uploaded to arbitrary locations on the web server's filesystem by abusing a path traversal vulnerability. Open_webui 8.8
2024-08-07 CVE-2024-6706 Attackers can craft a malicious prompt that coerces the language model into executing arbitrary JavaScript in the context of the web page. Open_webui 6.1