GHSA-3p9q-7w63-3f8q

Suggest an improvement
Source
https://github.com/advisories/GHSA-3p9q-7w63-3f8q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-3p9q-7w63-3f8q/GHSA-3p9q-7w63-3f8q.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-3p9q-7w63-3f8q
Aliases
  • CVE-2024-7033
Published
2025-03-20T12:32:45Z
Modified
2025-03-21T17:54:45.670957Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
Open WebUI Allows Arbitrary File Write via the `download_model` Endpoint
Details

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.

Database specific
{
    "nvd_published_at": "2025-03-20T10:15:34Z",
    "cwe_ids": [
        "CWE-29"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2025-03-21T17:30:18Z"
}
References

Affected packages

PyPI / open-webui

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.3.8

Affected versions

0.*

0.1.124
0.1.125
0.2.0
0.2.1
0.2.2
0.2.3
0.2.4
0.2.5
0.3.0
0.3.1
0.3.2
0.3.3
0.3.4
0.3.5
0.3.6
0.3.7
0.3.8