Vulnerability Description
In version v0.3.8 of open-webui/open-webui, sensitive actions such as deleting and resetting are performed using the GET method. This vulnerability allows an attacker to perform Cross-Site Request Forgery (CSRF) attacks, where an unaware user can unintentionally perform sensitive actions by simply visiting a malicious site or through top-level navigation. The affected endpoints include /rag/api/v1/reset, /rag/api/v1/reset/db, /api/v1/memories/reset, and /rag/api/v1/reset/uploads. This impacts both the availability and integrity of the application.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openwebui | Open Webui | 0.3.8 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/2ac81740-410b-467a-9244-75d82a6f9e11ExploitThird Party Advisory
FAQ
What is CVE-2024-7035?
CVE-2024-7035 is a vulnerability with a CVSS score of 6.9 (MEDIUM). In version v0.3.8 of open-webui/open-webui, sensitive actions such as deleting and resetting are performed using the GET method. This vulnerability allows an attacker to perform Cross-Site Request For...
How severe is CVE-2024-7035?
CVE-2024-7035 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7035?
Check the references section above for vendor advisories and patch information. Affected products include: Openwebui Open Webui.