CVE-2024-7035: Open WebUI: CSRF wipes RAG DB and AI memories via GET
GHSA-p5vx-9hj8-cf4h MEDIUM CISA: TRACK*Any authenticated admin of open-webui ≤ 0.3.8 can have their entire RAG knowledge base, AI memory, and uploaded documents silently wiped by visiting a malicious page. CSRF via GET means no user interaction beyond normal browsing is required. Upgrade immediately; if on-prem deployment, restrict access to internal networks as interim mitigation.
Risk Assessment
CVSS 6.9 Medium understates operational impact for AI deployments. EPSS 0.0004 indicates low active exploitation, but the attack is trivial to execute — a single img tag or iframe suffices. The PR:H in the vector reflects that the victim must be a privileged user, not that the attacker needs privileges. Data destruction of RAG databases represents irreversible loss if backups are absent. Organizations running open-webui as an enterprise LLM interface with curated knowledge bases face disproportionate operational risk.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.3.8 | No patch |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Upgrade open-webui to a version > 0.3.8.
-
If upgrade is not immediately possible: place the instance behind a VPN or internal network boundary, preventing external CSRF triggers.
-
Configure SameSite=Strict or SameSite=Lax on session cookies to block cross-origin requests at the browser level.
-
Audit web server logs for unexpected GET requests to /rag/api/v1/reset*, /api/v1/memories/reset — zero-arg resets from unexpected sources indicate exploitation.
-
Verify backup strategy for RAG databases and uploaded documents; test restore procedure before deploying the fix.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7035?
Any authenticated admin of open-webui ≤ 0.3.8 can have their entire RAG knowledge base, AI memory, and uploaded documents silently wiped by visiting a malicious page. CSRF via GET means no user interaction beyond normal browsing is required. Upgrade immediately; if on-prem deployment, restrict access to internal networks as interim mitigation.
Is CVE-2024-7035 actively exploited?
No confirmed active exploitation of CVE-2024-7035 has been reported, but organizations should still patch proactively.
How to fix CVE-2024-7035?
1. Upgrade open-webui to a version > 0.3.8. 2. If upgrade is not immediately possible: place the instance behind a VPN or internal network boundary, preventing external CSRF triggers. 3. Configure SameSite=Strict or SameSite=Lax on session cookies to block cross-origin requests at the browser level. 4. Audit web server logs for unexpected GET requests to /rag/api/v1/reset*, /api/v1/memories/reset — zero-arg resets from unexpected sources indicate exploitation. 5. Verify backup strategy for RAG databases and uploaded documents; test restore procedure before deploying the fix.
What systems are affected by CVE-2024-7035?
This vulnerability affects the following AI/ML architecture patterns: RAG pipelines, LLM web interfaces, AI agent memory systems, enterprise knowledge bases.
What is the CVSS score for CVE-2024-7035?
CVE-2024-7035 has a CVSS v3.1 base score of 6.9 (MEDIUM). The EPSS exploitation probability is 0.09%.
Technical Details
NVD Description
In version v0.3.8 of open-webui/open-webui, sensitive actions such as deleting and resetting are performed using the GET method. This vulnerability allows an attacker to perform Cross-Site Request Forgery (CSRF) attacks, where an unaware user can unintentionally perform sensitive actions by simply visiting a malicious site or through top-level navigation. The affected endpoints include /rag/api/v1/reset, /rag/api/v1/reset/db, /api/v1/memories/reset, and /rag/api/v1/reset/uploads. This impacts both the availability and integrity of the application.
Exploitation Scenario
Attacker sends a phishing email to a known open-webui admin containing a link to a malicious page. The page includes an img tag with src pointing to https://internal-webui.corp/rag/api/v1/reset/db. When the admin loads the page on their corporate browser — already authenticated to open-webui — the browser automatically issues the GET request with the admin's session cookie attached. The RAG database is wiped silently. The admin sees no error; the next LLM query simply returns no context-grounded answers. The attacker achieves persistent degradation of the AI system without ever authenticating to it.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:L References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert