CVE-2024-12537

In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unresponsive. This could lead to severe performance issues, causing the server to become unresponsive or experience significant degradation, ultimately resulting in service interruptions for legitimate users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openwebui:open_webui:0.3.32:*:*:*:*:*:*:*

History

01 Apr 2025, 20:34

Type Values Removed Values Added
CWE CWE-770
CPE cpe:2.3:a:openwebui:open_webui:0.3.32:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Openwebui
Openwebui open Webui
References () https://huntr.com/bounties/edabd06c-acc0-428c-a481-271f333755bc - () https://huntr.com/bounties/edabd06c-acc0-428c-a481-271f333755bc - Exploit

20 Mar 2025, 15:15

Type Values Removed Values Added
CWE CWE-400

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-04-04 09:15


NVD link : CVE-2024-12537

Mitre link : CVE-2024-12537


JSON object : View

Products Affected

openwebui

  • open_webui
CWE
CWE-770

Allocation of Resources Without Limits or Throttling