Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. open-webui
  4. ›
  5. CVE-2024-7053

CVE-2024-7053: Open WebUI Vulnerable to a Session Fixation Attack

March 20, 2025 (updated March 21, 2025)

A vulnerability in open-webui/open-webui version 0.3.8 allows an attacker with a user-level account to perform a session fixation attack. The session cookie for all users is set with the default SameSite=Lax and does not have the Secure flag enabled, allowing the session cookie to be sent over HTTP to a cross-origin domain. An attacker can exploit this by embedding a malicious markdown image in a chat, which, when viewed by an administrator, sends the admin’s session cookie to the attacker’s server. This can lead to a stealthy administrator account takeover, potentially resulting in remote code execution (RCE) due to the elevated privileges of administrator accounts.

References

  • github.com/advisories/GHSA-43g4-487m-5q6m
  • github.com/open-webui/open-webui
  • huntr.com/bounties/947f8191-0abf-4adf-b7c4-d4c19683aba2
  • nvd.nist.gov/vuln/detail/CVE-2024-7053

Code Behaviors & Features

Detect and mitigate CVE-2024-7053 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.3.8

Solution

Unfortunately, there is no solution available yet.

Impact 7.6 HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

pypi/open-webui/CVE-2024-7053.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 13 May 2025 00:14:33 +0000.