CVE-2024-7037: open-webui: path traversal → arbitrary file write/RCE
GHSA-54f4-v6v9-9q82 MEDIUM CISA: ATTENDAny user with admin credentials on open-webui <= 0.3.8 can overwrite system files via a crafted upload filename, achieving remote code execution. Despite the Medium CVSS rating, treat this as critical for internal AI deployments — shared admin credentials are endemic in AI/ML teams. Update immediately or block access to the pipeline upload endpoint at the network layer.
Risk Assessment
CVSS 6.5 underrepresents operational risk. The High Privilege requirement is the only meaningful barrier, and AI teams routinely share admin credentials or run open-webui with minimal access controls on internal networks. Path traversal-to-RCE is a trivial, well-documented exploit chain requiring no AI/ML expertise. Deployments exposed beyond localhost — even on internal networks — should be treated as high severity.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.3.8 | No patch |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Update open-webui immediately to a version beyond 0.3.8.
-
If patching is delayed, block /api/pipelines/upload at the WAF or reverse proxy layer.
-
Audit existing pipeline files in CACHE_DIR for unexpected content or path-traversal artifacts.
-
Enforce strong unique admin credentials and restrict admin access to trusted IPs.
-
Monitor CACHE_DIR parent directories for unexpected file creation or modification via filesystem auditing (auditd, inotify).
-
Limit Docker volume mounts to the minimum required — avoid mounting host paths writable by the app container.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7037?
Any user with admin credentials on open-webui <= 0.3.8 can overwrite system files via a crafted upload filename, achieving remote code execution. Despite the Medium CVSS rating, treat this as critical for internal AI deployments — shared admin credentials are endemic in AI/ML teams. Update immediately or block access to the pipeline upload endpoint at the network layer.
Is CVE-2024-7037 actively exploited?
No confirmed active exploitation of CVE-2024-7037 has been reported, but organizations should still patch proactively.
How to fix CVE-2024-7037?
1. Update open-webui immediately to a version beyond 0.3.8. 2. If patching is delayed, block /api/pipelines/upload at the WAF or reverse proxy layer. 3. Audit existing pipeline files in CACHE_DIR for unexpected content or path-traversal artifacts. 4. Enforce strong unique admin credentials and restrict admin access to trusted IPs. 5. Monitor CACHE_DIR parent directories for unexpected file creation or modification via filesystem auditing (auditd, inotify). 6. Limit Docker volume mounts to the minimum required — avoid mounting host paths writable by the app container.
What systems are affected by CVE-2024-7037?
This vulnerability affects the following AI/ML architecture patterns: self-hosted LLM deployments, AI pipeline systems, model serving, agent frameworks.
What is the CVSS score for CVE-2024-7037?
CVE-2024-7037 has a CVSS v3.1 base score of 6.5 (MEDIUM). The EPSS exploitation probability is 2.28%.
Technical Details
NVD Description
In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
Exploitation Scenario
An attacker obtains admin credentials via credential stuffing, phishing, or password reuse common in AI/ML teams. They send a POST to /api/pipelines/upload with a filename crafted as '../../etc/cron.d/backdoor' or '../../usr/local/lib/python3.x/site-packages/malicious.py'. The server concatenates the unsanitized filename with CACHE_DIR and writes attacker-controlled content to the resolved path. The cron variant schedules a reverse shell; the Python module variant injects malicious code executed during the next LLM inference request. Standard tooling (curl, Burp Suite) suffices — no AI/ML knowledge required.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert