icon

We found results for “

CVE-2024-7034

Date: March 20, 2025

In open-webui version 0.3.8, the endpoint "/models/upload" is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of "file_path = f"{UPLOAD_DIR}/{file.filename}"" without proper input validation or sanitization. An attacker can exploit this by manipulating the "file.filename" parameter to include directory traversal sequences, causing the resulting "file_path" to escape the intended "UPLOAD_DIR" and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-22

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us