Open WebUI 0.1.105

CPE Details

Open WebUI 0.1.105
0.1.105
2024-10-17
10h22 +00:00
2024-10-17
10h22 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:openwebui:open_webui:0.1.105:*:*:*:*:*:*:*

Informations

Vendor

openwebui

Product

open_webui

Version

0.1.105

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-46719 2025-05-05 18h50 +00:00 Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.6.6, a vulnerability in the way certain html tags in chat messages are rendered allows attackers to inject JavaScript code into a chat transcript. The JavaScript code will be executed in the user's browser every time that chat transcript is opened, allowing attackers to retrieve the user's access token and gain full control over their account. Chat transcripts can be shared with other users in the same server, or with the whole open-webui community if "Enable Community Sharing" is enabled in the admin panel. If this exploit is used against an admin user, it is possible to achieve Remote Code Execution on the server where the open-webui backend is hosted. This can be done by creating a new function which contains malicious python code. This vulnerability also affects chat transcripts uploaded to `https://openwebui.com/c//`, allowing for wormable stored XSS in https[:]//openwebui[.]com. Version 0.6.6 contains a patch for the issue.
5.4
Moyen
CVE-2025-46571 2025-05-05 18h45 +00:00 Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.6.6, low privileged users can upload HTML files which contain JavaScript code via the `/api/v1/files/` backend endpoint. This endpoint returns a file id, which can be used to open the file in the browser and trigger the JavaScript code in the user's browser. Under the default settings, files uploaded by low-privileged users can only be viewed by admins or themselves, limiting the impact of this vulnerability. A link to such a file can be sent to an admin, and if clicked, will give the low-privileged user complete control over the admin's account, ultimately enabling RCE via functions. Version 0.6.6 contains a fix for the issue.
5.3
Moyen
CVE-2024-7806 2025-03-20 10h11 +00:00 A vulnerability in open-webui/open-webui versions <= 0.3.8 allows remote code execution by non-admin users via Cross-Site Request Forgery (CSRF). The application uses cookies with the SameSite attribute set to lax for authentication and lacks CSRF tokens. This allows an attacker to craft a malicious HTML that, when accessed by a victim, can modify the Python code of an existing pipeline and execute arbitrary code with the victim's privileges.
8.8
Haute
CVE-2024-6707 2024-08-07 23h04 +00:00 Attacker controlled files can be uploaded to arbitrary locations on the web server's filesystem by abusing a path traversal vulnerability.
8.8
Haute
CVE-2024-6706 2024-08-07 23h01 +00:00 Attackers can craft a malicious prompt that coerces the language model into executing arbitrary JavaScript in the context of the web page.
6.3
Moyen