Vulnerability Description
In version v0.3.10 of open-webui/open-webui, the `api/v1/utils/pdf` endpoint lacks authentication mechanisms, allowing unauthenticated attackers to access the PDF generation service. This vulnerability can be exploited by sending a POST request with an excessively large payload, potentially leading to server resource exhaustion and denial of service (DoS). Additionally, unauthorized users can misuse the endpoint to generate PDFs without verification, resulting in service misuse and potential operational and financial impacts.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openwebui | Open Webui | 0.3.10 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/ebe8c1fa-113b-4df9-be03-a406b9adb9f4ExploitThird Party Advisory
- https://huntr.com/bounties/ebe8c1fa-113b-4df9-be03-a406b9adb9f4ExploitThird Party Advisory
FAQ
What is CVE-2024-8053?
CVE-2024-8053 is a vulnerability with a CVSS score of 8.2 (HIGH). In version v0.3.10 of open-webui/open-webui, the `api/v1/utils/pdf` endpoint lacks authentication mechanisms, allowing unauthenticated attackers to access the PDF generation service. This vulnerabilit...
How severe is CVE-2024-8053?
CVE-2024-8053 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-8053?
Check the references section above for vendor advisories and patch information. Affected products include: Openwebui Open Webui.