CVE-2024-7035: Open WebUI: CSRF wipes RAG DB and AI memories via GET

GHSA-p5vx-9hj8-cf4h MEDIUM CISA: TRACK*
Published March 20, 2025
CISO Take

Any authenticated admin of open-webui ≤ 0.3.8 can have their entire RAG knowledge base, AI memory, and uploaded documents silently wiped by visiting a malicious page. CSRF via GET means no user interaction beyond normal browsing is required. Upgrade immediately; if on-prem deployment, restrict access to internal networks as interim mitigation.

Risk Assessment

CVSS 6.9 Medium understates operational impact for AI deployments. EPSS 0.0004 indicates low active exploitation, but the attack is trivial to execute — a single img tag or iframe suffices. The PR:H in the vector reflects that the victim must be a privileged user, not that the attacker needs privileges. Data destruction of RAG databases represents irreversible loss if backups are absent. Organizations running open-webui as an enterprise LLM interface with curated knowledge bases face disproportionate operational risk.

Affected Systems

Package Ecosystem Vulnerable Range Patched
open-webui pip <= 0.3.8 No patch
135.3K Pushed 8d ago 58% patched ~9d to patch Full package profile →

Do you use open-webui? You're affected.

Severity & Risk

CVSS 3.1
6.9 / 10
EPSS
0.1%
chance of exploitation in 30 days
Higher than 25% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
CISA SSVC: Public PoC
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR High
UI Required
S Changed
C None
I High
A Low

Recommended Action

5 steps
  1. Upgrade open-webui to a version > 0.3.8.

  2. If upgrade is not immediately possible: place the instance behind a VPN or internal network boundary, preventing external CSRF triggers.

  3. Configure SameSite=Strict or SameSite=Lax on session cookies to block cross-origin requests at the browser level.

  4. Audit web server logs for unexpected GET requests to /rag/api/v1/reset*, /api/v1/memories/reset — zero-arg resets from unexpected sources indicate exploitation.

  5. Verify backup strategy for RAG databases and uploaded documents; test restore procedure before deploying the fix.

CISA SSVC Assessment

Decision Track*
Exploitation poc
Automatable No
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, robustness and cybersecurity
ISO 42001
8.4 - AI system risk treatment
NIST AI RMF
MANAGE 2.2 - Mechanisms for AI risk response and recovery
OWASP LLM Top 10
LLM04 - Data and Model Poisoning

Frequently Asked Questions

What is CVE-2024-7035?

Any authenticated admin of open-webui ≤ 0.3.8 can have their entire RAG knowledge base, AI memory, and uploaded documents silently wiped by visiting a malicious page. CSRF via GET means no user interaction beyond normal browsing is required. Upgrade immediately; if on-prem deployment, restrict access to internal networks as interim mitigation.

Is CVE-2024-7035 actively exploited?

No confirmed active exploitation of CVE-2024-7035 has been reported, but organizations should still patch proactively.

How to fix CVE-2024-7035?

1. Upgrade open-webui to a version > 0.3.8. 2. If upgrade is not immediately possible: place the instance behind a VPN or internal network boundary, preventing external CSRF triggers. 3. Configure SameSite=Strict or SameSite=Lax on session cookies to block cross-origin requests at the browser level. 4. Audit web server logs for unexpected GET requests to /rag/api/v1/reset*, /api/v1/memories/reset — zero-arg resets from unexpected sources indicate exploitation. 5. Verify backup strategy for RAG databases and uploaded documents; test restore procedure before deploying the fix.

What systems are affected by CVE-2024-7035?

This vulnerability affects the following AI/ML architecture patterns: RAG pipelines, LLM web interfaces, AI agent memory systems, enterprise knowledge bases.

What is the CVSS score for CVE-2024-7035?

CVE-2024-7035 has a CVSS v3.1 base score of 6.9 (MEDIUM). The EPSS exploitation probability is 0.09%.

Technical Details

NVD Description

In version v0.3.8 of open-webui/open-webui, sensitive actions such as deleting and resetting are performed using the GET method. This vulnerability allows an attacker to perform Cross-Site Request Forgery (CSRF) attacks, where an unaware user can unintentionally perform sensitive actions by simply visiting a malicious site or through top-level navigation. The affected endpoints include /rag/api/v1/reset, /rag/api/v1/reset/db, /api/v1/memories/reset, and /rag/api/v1/reset/uploads. This impacts both the availability and integrity of the application.

Exploitation Scenario

Attacker sends a phishing email to a known open-webui admin containing a link to a malicious page. The page includes an img tag with src pointing to https://internal-webui.corp/rag/api/v1/reset/db. When the admin loads the page on their corporate browser — already authenticated to open-webui — the browser automatically issues the GET request with the admin's session cookie attached. The RAG database is wiped silently. The admin sees no error; the next LLM query simply returns no context-grounded answers. The attacker achieves persistent degradation of the AI system without ever authenticating to it.

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:L

Timeline

Published
March 20, 2025
Last Modified
March 21, 2025
First Seen
March 24, 2026

Related Vulnerabilities