CVE-2024-7038: open-webui: filesystem enumeration via admin error messages
GHSA-mq92-jr35-ffpc LOW PoC AVAILABLE CISA: TRACK*This is a low-severity information disclosure in open-webui 0.3.8 that requires admin-level access to exploit — meaning the blast radius is limited to already-privileged accounts. That said, in AI deployments where open-webui fronts LLMs, a stolen admin session could use this to silently map server filesystem paths before escalating. Upgrade beyond 0.3.8 and enforce MFA on admin accounts.
Risk Assessment
Low exploitability in practice. CVSS 2.7 with PR:H means an attacker must already hold admin credentials, severely limiting the threat population. However, AI chat platforms like open-webui are increasingly exposed externally and may have weak admin credential hygiene. The vulnerability enables filesystem path enumeration, which is reconnaissance value, not direct damage. Risk elevation occurs if admin credentials are shared, phished, or if the webui runs with elevated OS permissions giving the attacker a blueprint of the host.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.3.8 | No patch |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Upgrade open-webui beyond 0.3.8 — no official patched version is listed in NVD at time of publication, monitor the repo for a fix.
-
Enforce MFA on all admin accounts accessing open-webui — this is the primary control given PR:H requirement.
-
Run open-webui with a least-privilege service account that has read access only to model directories, limiting filesystem enumeration value.
-
Deploy open-webui behind a reverse proxy with admin paths (/admin/*) restricted to internal networks or VPN.
-
Detection: Log all admin-triggered embedding model path changes and alert on high-frequency or unusual path values (e.g., /etc/, /root/, /home/) in admin activity logs.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7038?
This is a low-severity information disclosure in open-webui 0.3.8 that requires admin-level access to exploit — meaning the blast radius is limited to already-privileged accounts. That said, in AI deployments where open-webui fronts LLMs, a stolen admin session could use this to silently map server filesystem paths before escalating. Upgrade beyond 0.3.8 and enforce MFA on admin accounts.
Is CVE-2024-7038 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-7038, increasing the risk of exploitation.
How to fix CVE-2024-7038?
1. Upgrade open-webui beyond 0.3.8 — no official patched version is listed in NVD at time of publication, monitor the repo for a fix. 2. Enforce MFA on all admin accounts accessing open-webui — this is the primary control given PR:H requirement. 3. Run open-webui with a least-privilege service account that has read access only to model directories, limiting filesystem enumeration value. 4. Deploy open-webui behind a reverse proxy with admin paths (/admin/*) restricted to internal networks or VPN. 5. Detection: Log all admin-triggered embedding model path changes and alert on high-frequency or unusual path values (e.g., /etc/, /root/, /home/) in admin activity logs.
What systems are affected by CVE-2024-7038?
This vulnerability affects the following AI/ML architecture patterns: RAG pipelines, on-premise LLM deployments, AI chat interfaces, embedding pipelines.
What is the CVSS score for CVE-2024-7038?
CVE-2024-7038 has a CVSS v3.1 base score of 2.7 (LOW). The EPSS exploitation probability is 0.21%.
Technical Details
NVD Description
An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides different error messages based on the existence and configuration of the file. This behavior allows an attacker to enumerate file names and traverse directories by observing the error messages, leading to potential exposure of sensitive information.
Exploitation Scenario
An attacker compromises an open-webui admin account via credential stuffing or phishing. They navigate to Admin Settings > Embedding Model and iteratively submit file paths as model location values. The application returns distinct error messages — 'file not found', 'invalid model format', or 'permission denied' — depending on whether the path exists and is readable. The attacker scripts this to enumerate directories: /etc/passwd, /app/config/, /models/, extracting a filesystem map of the server. This reconnaissance could precede a second-stage attack using another vulnerability or misconfiguration to read those discovered files.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert