Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. open-webui
  4. ›
  5. CVE-2024-7033

CVE-2024-7033: Open WebUI Allows Arbitrary File Write via the `download_model` Endpoint

March 20, 2025 (updated March 21, 2025)

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server’s filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.

References

  • github.com/advisories/GHSA-3p9q-7w63-3f8q
  • github.com/open-webui/open-webui
  • huntr.com/bounties/7078261f-8414-4bb7-9d72-a2a4d8bfd5d1
  • nvd.nist.gov/vuln/detail/CVE-2024-7033

Code Behaviors & Features

Detect and mitigate CVE-2024-7033 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.3.8

Solution

Unfortunately, there is no solution available yet.

Impact 6.5 MEDIUM

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-29: Path Traversal: '..filename'

Source file

pypi/open-webui/CVE-2024-7033.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 13 May 2025 00:16:12 +0000.