Platform
python
Component
open-webui
Fixed in
0.3.9
CVE-2024-7035 is a Cross-Site Request Forgery (CSRF) vulnerability affecting open-webui versions up to v0.3.8. This flaw allows attackers to trick users into unknowingly performing sensitive actions within the application. The vulnerability stems from sensitive operations being executed via GET requests, making them susceptible to manipulation through malicious websites or links. Affected users should upgrade to a patched version as soon as possible.
The primary impact of CVE-2024-7035 is the potential for unauthorized data modification and deletion. An attacker could craft a malicious website or link that, when visited by an authenticated user of open-webui, would trigger actions such as resetting the database (/rag/api/v1/reset/db), deleting memories (/api/v1/memories/reset), or clearing uploads (/rag/api/v1/reset/uploads). This could lead to data loss, service disruption, and compromise of the application's integrity. The blast radius extends to any user with access to these sensitive functions within open-webui, and the ease of exploitation via simple website visits makes it a significant risk. While not directly leading to remote code execution, the data manipulation capabilities can be leveraged for further attacks.
CVE-2024-7035 was published on 2025-03-20. Its severity is currently assessed as MEDIUM (CVSS 6.9). There are no known public Proof-of-Concept (POC) exploits available at this time, but the ease of CSRF exploitation suggests a potential for rapid development of such exploits. The vulnerability is not currently listed on KEV or EPSS, indicating a low to medium probability of active exploitation. Monitor security advisories and threat intelligence feeds for updates.
Exploit Status
EPSS
0.04% (12% percentile)
CISA SSVC
CVSS Vector
The recommended mitigation for CVE-2024-7035 is to upgrade open-webui to a version that addresses the vulnerability. Unfortunately, a fixed version is not currently specified. As a workaround, implement strict input validation and output encoding on all sensitive endpoints, specifically /rag/api/v1/reset, /rag/api/v1/reset/db, /api/v1/memories/reset, and /rag/api/v1/reset/uploads. Consider implementing CSRF tokens for these endpoints to prevent unauthorized requests. Web Application Firewalls (WAFs) can be configured to detect and block suspicious GET requests targeting these endpoints. Monitor application logs for unusual activity related to these endpoints. After applying mitigations, verify functionality by attempting to trigger the sensitive actions through a controlled environment to ensure protection.
Actualice a una versión posterior a la 0.3.8 donde se haya corregido la vulnerabilidad CSRF. Como medida temporal, evite acceder a sitios web no confiables mientras esté autenticado en open-webui. Considere implementar protecciones CSRF en su propia configuración si es posible.
Vulnerability analysis and critical alerts directly to your inbox.
It's a Cross-Site Request Forgery (CSRF) vulnerability in open-webui versions up to v0.3.8, allowing attackers to perform actions as an authenticated user.
If you are using open-webui version 0.3.8 or earlier, you are potentially affected by this vulnerability.
Upgrade to a patched version of open-webui as soon as it becomes available. Implement CSRF tokens and input validation as a temporary workaround.
Currently, there are no known public exploits, but the ease of CSRF exploitation suggests a potential for future attacks.
Refer to the official NVD entry for CVE-2024-7035 and monitor security advisories from the open-webui project.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.