CVE-2024-7033

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.
References
Link Resource
https://huntr.com/bounties/7078261f-8414-4bb7-9d72-a2a4d8bfd5d1 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*

History

29 Jul 2025, 18:07

Type Values Removed Values Added
References () https://huntr.com/bounties/7078261f-8414-4bb7-9d72-a2a4d8bfd5d1 - () https://huntr.com/bounties/7078261f-8414-4bb7-9d72-a2a4d8bfd5d1 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
First Time Openwebui
Openwebui open Webui
CPE cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-29 18:07


NVD link : CVE-2024-7033

Mitre link : CVE-2024-7033


JSON object : View

Products Affected

openwebui

  • open_webui
CWE
CWE-29

Path Traversal: '\..\filename'