Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ff5c-56m7-vc75

Опубликовано: 20 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Open WebUI allows Remote Code Execution via Arbitrary File Upload to /audio/api/v1/transcriptions

OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint /audio/api/v1/transcriptions that allows for arbitrary file upload. The application performs insufficient validation on the file.content_type and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.

Пакеты

Наименование

open-webui

pip
Затронутые версииВерсия исправления

< 0.5.17

0.5.17

EPSS

Процентиль: 76%
0.00917
Низкий

8.1 High

CVSS3

Дефекты

CWE-22
CWE-434

Связанные уязвимости

CVSS3: 8.1
nvd
11 месяцев назад

OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint `/audio/api/v1/transcriptions` that allows for arbitrary file upload. The application performs insufficient validation on the `file.content_type` and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.

EPSS

Процентиль: 76%
0.00917
Низкий

8.1 High

CVSS3

Дефекты

CWE-22
CWE-434