CVE-2024-7034

In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without proper input validation or sanitization. An attacker can exploit this by manipulating the `file.filename` parameter to include directory traversal sequences, causing the resulting `file_path` to escape the intended `UPLOAD_DIR` and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution.
References
Link Resource
https://huntr.com/bounties/711beada-10fe-4567-9278-80a689da8613 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*

History

29 Jul 2025, 18:06

Type Values Removed Values Added
First Time Openwebui
Openwebui open Webui
References () https://huntr.com/bounties/711beada-10fe-4567-9278-80a689da8613 - () https://huntr.com/bounties/711beada-10fe-4567-9278-80a689da8613 - Exploit, Third Party Advisory
CPE cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-29 18:06


NVD link : CVE-2024-7034

Mitre link : CVE-2024-7034


JSON object : View

Products Affected

openwebui

  • open_webui
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')