CVE-2024-7033: open-webui: path traversal allows file write and RCE
GHSA-3p9q-7w63-3f8q MEDIUM CISA: TRACK*Any authenticated admin on an open-webui 0.3.8 Windows deployment can write arbitrary files via the model download endpoint, with a clear path to remote code execution. No upstream patch is listed — disable or firewall-restrict the download_model endpoint immediately and audit who holds admin access on open-webui instances. Migrate Windows-based deployments to Linux containers as a structural control.
Risk Assessment
CVSS 6.5 underrepresents operational risk for teams running open-webui on Windows. While PR:H limits exposure to authenticated admins, AI labs frequently deploy open-webui with loose access controls and shared credentials. Path traversal payloads are trivial to craft, and overwriting Windows system files or startup scripts can escalate to full host compromise. EPSS of 1.16% is low and it is not in CISA KEV, but the zero-patch status and RCE ceiling make this a priority for Windows-hosting environments.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.3.8 | No patch |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
7 steps-
Inventory all open-webui deployments and flag Windows instances on version 0.3.8 or earlier.
-
Enforce least-privilege admin access and MFA on all open-webui admin accounts.
-
No official patch available — block or rate-limit the /download_model endpoint at the reverse proxy or WAF.
-
Apply Windows file integrity monitoring (e.g., Sysmon, Wazuh) to detect unexpected writes outside the application directory.
-
Migrate production Windows deployments to Linux containers as a structural mitigation.
-
Monitor open-webui GitHub releases and apply the patch as soon as it ships.
-
Restrict open-webui to internal networks only — never expose admin interfaces to the public internet.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7033?
Any authenticated admin on an open-webui 0.3.8 Windows deployment can write arbitrary files via the model download endpoint, with a clear path to remote code execution. No upstream patch is listed — disable or firewall-restrict the download_model endpoint immediately and audit who holds admin access on open-webui instances. Migrate Windows-based deployments to Linux containers as a structural control.
Is CVE-2024-7033 actively exploited?
No confirmed active exploitation of CVE-2024-7033 has been reported, but organizations should still patch proactively.
How to fix CVE-2024-7033?
1. Inventory all open-webui deployments and flag Windows instances on version 0.3.8 or earlier. 2. Enforce least-privilege admin access and MFA on all open-webui admin accounts. 3. No official patch available — block or rate-limit the /download_model endpoint at the reverse proxy or WAF. 4. Apply Windows file integrity monitoring (e.g., Sysmon, Wazuh) to detect unexpected writes outside the application directory. 5. Migrate production Windows deployments to Linux containers as a structural mitigation. 6. Monitor open-webui GitHub releases and apply the patch as soon as it ships. 7. Restrict open-webui to internal networks only — never expose admin interfaces to the public internet.
What systems are affected by CVE-2024-7033?
This vulnerability affects the following AI/ML architecture patterns: local LLM serving, model management interfaces, AI development environments, enterprise AI sandboxes.
What is the CVSS score for CVE-2024-7033?
CVE-2024-7033 has a CVSS v3.1 base score of 6.5 (MEDIUM). The EPSS exploitation probability is 1.34%.
Technical Details
NVD Description
In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.
Exploitation Scenario
An attacker obtains admin credentials to an open-webui instance running on a Windows server — via phishing, credential stuffing, or a shared dev environment. They call the download_model API endpoint with a crafted model path containing Windows path traversal sequences (e.g., ..\..\Windows\System32\) targeting a DLL loaded by a high-privilege service, or dropping a malicious script in a Windows startup folder. On next service restart or user login, the payload executes under the open-webui service account — potentially SYSTEM — granting persistent remote access to the host and full lateral movement capability across the organization's AI infrastructure.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert