CVE-2024-7039: open-webui: Privilege bypass enables admin account deletion
GHSA-pqwr-phvv-v49f HIGH CISA: ATTENDAn authenticated admin in open-webui ≤0.3.8 can delete other admin accounts via direct API calls, bypassing UI restrictions — enabling admin lockout or account takeover within the platform. If open-webui is deployed as an internal AI gateway, any compromised admin credential becomes a path to exclusive platform control. Update to a version >0.3.8 immediately and restrict API access to trusted networks.
Risk Assessment
CVSS 8.3 (High). Low EPSS (0.00092) indicates no active exploitation at publication time, but the attack is trivial once admin credentials are obtained — no special tooling or AI expertise required, just a direct HTTP DELETE call. Open-webui is widely deployed as a self-hosted LLM interface in enterprise and research environments, meaning the exposed attack surface is broad. The blast radius is limited to open-webui instances, but loss of administrative control over an AI gateway can indirectly expose underlying model infrastructure, API keys, and conversation histories.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.3.8 | No patch |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
1 step-
1) Update open-webui to the latest available version (>0.3.8). 2) If patching is not immediately feasible, block or restrict access to DELETE requests on /api/v1/users/ via reverse proxy or WAF rules. 3) Audit all current admin accounts for unauthorized deletions or additions. 4) Enable API access logging and alert on DELETE requests to /api/v1/users/{uuid}. 5) Apply least-privilege principles — minimize the number of admin accounts and rotate credentials for any accounts that may have been exposed.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7039?
An authenticated admin in open-webui ≤0.3.8 can delete other admin accounts via direct API calls, bypassing UI restrictions — enabling admin lockout or account takeover within the platform. If open-webui is deployed as an internal AI gateway, any compromised admin credential becomes a path to exclusive platform control. Update to a version >0.3.8 immediately and restrict API access to trusted networks.
Is CVE-2024-7039 actively exploited?
No confirmed active exploitation of CVE-2024-7039 has been reported, but organizations should still patch proactively.
How to fix CVE-2024-7039?
1) Update open-webui to the latest available version (>0.3.8). 2) If patching is not immediately feasible, block or restrict access to DELETE requests on /api/v1/users/ via reverse proxy or WAF rules. 3) Audit all current admin accounts for unauthorized deletions or additions. 4) Enable API access logging and alert on DELETE requests to /api/v1/users/{uuid}. 5) Apply least-privilege principles — minimize the number of admin accounts and rotate credentials for any accounts that may have been exposed.
What systems are affected by CVE-2024-7039?
This vulnerability affects the following AI/ML architecture patterns: AI chat interfaces, self-hosted LLM deployments, model serving, agent frameworks.
What is the CVSS score for CVE-2024-7039?
CVE-2024-7039 has a CVSS v3.1 base score of 8.3 (HIGH). The EPSS exploitation probability is 0.17%.
Technical Details
NVD Description
In open-webui/open-webui version v0.3.8, there is an improper privilege management vulnerability. The application allows an attacker, acting as an admin, to delete other administrators via the API endpoint `http://0.0.0.0:8080/api/v1/users/{uuid_administrator}`. This action is restricted by the user interface but can be performed through direct API calls.
Exploitation Scenario
An attacker obtains admin credentials to an open-webui instance via phishing, credential stuffing, or an insider threat. Rather than using the web UI — which enforces peer-admin deletion restrictions — the attacker issues a direct HTTP DELETE to /api/v1/users/{uuid_of_other_admin}, removing all other administrators one by one. Now the sole admin, they reconfigure model backends to route prompts through attacker-controlled infrastructure, exfiltrate stored conversation histories containing sensitive business data, and expose API keys for underlying LLM providers.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert