Latest CVE Feed
-
9.0
CRITICALCVE-2024-7053
A vulnerability in open-webui/open-webui version 0.3.8 allows an attacker with a user-level account to perform a session fixation attack. The session cookie for all users is set with the default `SameSite=Lax` and does not have the `Secure` flag enabled, ... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Authentication
-
4.3
MEDIUMCVE-2024-7046
An improper access control vulnerability in open-webui/open-webui v0.3.8 allows an attacker to view admin details. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/auths/admin/det... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2024-7045
In version v0.3.8 of open-webui/open-webui, improper access control vulnerabilities allow an attacker to view any prompts. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/prompts... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Authorization
-
8.9
HIGHCVE-2024-7044
A Stored Cross-Site Scripting (XSS) vulnerability exists in the chat file upload functionality of open-webui/open-webui version 0.3.8. An attacker can inject malicious content into a file, which, when accessed by a victim through a URL or shared chat, exe... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Cross-Site Scripting
-
8.8
HIGHCVE-2024-7043
An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 18, 2025
- Vuln Type: Authorization
-
4.9
MEDIUMCVE-2024-7040
In version v0.3.8 of open-webui/open-webui, there is an improper access control vulnerability. On the frontend admin page, administrators are intended to view only the chats of non-admin members. However, by modifying the user_id parameter, it is possible... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 18, 2025
- Vuln Type: Authorization
-
8.3
HIGHCVE-2024-7039
In open-webui/open-webui version v0.3.8, there is an improper privilege management vulnerability. The application allows an attacker, acting as an admin, to delete other administrators via the API endpoint `http://0.0.0.0:8080/api/v1/users/{uuid_administr... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 18, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-7036
A vulnerability in open-webui/open-webui v0.3.8 allows an unauthenticated attacker to sign up with excessively large text in the 'name' field, causing the Admin panel to become unresponsive. This prevents administrators from performing essential user mana... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 18, 2025
- Vuln Type: Denial of Service
-
6.9
MEDIUMCVE-2024-7035
In version v0.3.8 of open-webui/open-webui, sensitive actions such as deleting and resetting are performed using the GET method. This vulnerability allows an attacker to perform Cross-Site Request Forgery (CSRF) attacks, where an unaware user can unintent... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Cross-Site Request Forgery
-
7.2
HIGHCVE-2024-7034
In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without proper i... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Path Traversal
-
7.2
HIGHCVE-2024-7033
In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write file... Read more
Affected Products : open_webui- Published: Mar. 20, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Path Traversal
-
5.5
MEDIUMCVE-2024-6986
A Cross-site Scripting (XSS) vulnerability exists in the Settings page of parisneo/lollms-webui version 9.8. The vulnerability is due to the improper use of the 'v-html' directive, which inserts the content of the 'full_template' variable directly as HTML... Read more
Affected Products : lollms_web_ui- Published: Mar. 20, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Cross-Site Scripting
-
8.4
HIGHCVE-2024-6982
A remote code execution vulnerability exists in the Calculate function of parisneo/lollms version 9.8. The vulnerability arises from the use of Python's `eval()` function to evaluate mathematical expressions within a Python sandbox that disables `__builti... Read more
Affected Products : lollms- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2024-6866
corydolphin/flask-cors version 4.01 contains a vulnerability where the request path matching is case-insensitive due to the use of the `try_match` function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs ... Read more
- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2024-6863
In h2oai/h2o-3 version 3.46.0, an endpoint exposing a custom EncryptionTool allows an attacker to encrypt any files on the target server with a key of their choosing. The chosen key can also be overwritten, resulting in ransomware-like behavior. This vuln... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Misconfiguration
-
7.1
HIGHCVE-2024-6854
In h2oai/h2o-3 version 3.46.0, the endpoint for exporting models does not restrict the export location, allowing an attacker to export a model to any file in the server's file structure, thereby overwriting it. This vulnerability can be exploited to overw... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2024-6851
In version 3.22.0 of aimhubio/aim, the LocalFileManager._cleanup function in the aim tracking server accepts a user-specified glob-pattern for deleting files. The function does not verify that the matched files are within the directory managed by LocalFil... Read more
Affected Products : aim- Published: Mar. 20, 2025
- Modified: Jul. 23, 2025
- Vuln Type: Path Traversal
-
5.3
MEDIUMCVE-2024-6844
A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ... Read more
- Published: Mar. 20, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2024-6842
In version 1.5.5 of mintplex-labs/anything-llm, the `/setup-complete` API endpoint allows unauthorized users to access sensitive system settings. The data returned by the `currentSettings` function includes sensitive information such as API keys for searc... Read more
Affected Products : anythingllm- Published: Mar. 20, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-6841
A Cross-Site Request Forgery (CSRF) vulnerability exists in the latest commit (56b782bcefd2e59b19cd7ba7878b95f54884f502) of the vanna-ai/vanna repository. Two endpoints in the built-in web app that provide SQL functionality are implemented as simple GET r... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Cross-Site Request Forgery