An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS0zcDlxLTd3NjMtM2Y4cc4ABFuB

Moderate EPSS: 0.00402% (0.6003 Percentile) EPSS:

Open WebUI Allows Arbitrary File Write via the `download_model` Endpoint

Affected Packages Affected Versions Fixed Versions
pypi:open-webui <= 0.3.8 No known fixed version
0 Dependent packages
0 Dependent repositories
351,140 Downloads last month

Affected Version Ranges

All affected versions

0.1.124, 0.1.125, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.3.6, 0.3.7, 0.3.8

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.

References: