A vulnerability in open-webui/open-webui versions <= 0.3.8 allows remote code execution by non-admin users via Cross-Site Request Forgery (CSRF). The application uses cookies with the SameSite attribute set to lax for authentication and lacks CSRF tokens. This allows an attacker to craft a malicious HTML that, when accessed by a victim, can modify the Python code of an existing pipeline and execute arbitrary code with the victim's privileges.
Metrics
Affected Vendors & Products
References
History
Wed, 26 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openwebui
Openwebui open Webui |
|
CPEs | cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:* | |
Vendors & Products |
Openwebui
Openwebui open Webui |
|
Metrics |
cvssV3_1
|
Thu, 20 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in open-webui/open-webui versions <= 0.3.8 allows remote code execution by non-admin users via Cross-Site Request Forgery (CSRF). The application uses cookies with the SameSite attribute set to lax for authentication and lacks CSRF tokens. This allows an attacker to craft a malicious HTML that, when accessed by a victim, can modify the Python code of an existing pipeline and execute arbitrary code with the victim's privileges. | |
Title | Remote Code Execution by Non-Admin Users via CSRF in open-webui/open-webui | |
Weaknesses | CWE-352 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T15:21:35.392Z
Reserved: 2024-08-14T17:26:32.229Z
Link: CVE-2024-7806

Updated: 2025-03-20T15:21:26.162Z

Status : Analyzed
Published: 2025-03-20T10:15:37.893
Modified: 2025-03-26T16:46:35.783
Link: CVE-2024-7806

No data.