CVE-2024-7043: Open WebUI: auth bypass exposes all user files

GHSA-jrhc-9qg9-4qfq HIGH CISA: ATTEND
Published March 20, 2025
CISO Take

Any authenticated user on open-webui v0.3.8 can enumerate, read, and delete files uploaded by all other users via unauthenticated API calls — no admin role required. If your org runs this version as an internal LLM frontend, treat all previously uploaded documents as potentially compromised. Upgrade immediately or isolate the deployment to fully trusted users pending a verified patch.

Risk Assessment

High severity (CVSS 8.1) but low active exploitation probability (EPSS 0.0008). The vulnerability requires only a valid low-privilege account and zero AI/ML knowledge, making it trivially exploitable by any insider or compromised user account. Risk is amplified in multi-tenant or enterprise deployments where sensitive documents are routinely uploaded for LLM-assisted analysis — the attacker surface is every file every user has ever uploaded.

Affected Systems

Package Ecosystem Vulnerable Range Patched
open-webui pip <= 0.3.8 No patch
135.3K Pushed 8d ago 58% patched ~9d to patch Full package profile →

Do you use open-webui? You're affected.

Severity & Risk

CVSS 3.1
8.1 / 10
EPSS
0.2%
chance of exploitation in 30 days
Higher than 40% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
CISA SSVC: Public PoC
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR Low
UI None
S Unchanged
C High
I High
A None

Recommended Action

6 steps
  1. Upgrade open-webui to a patched version above v0.3.8 immediately — verify the changelog confirms authorization enforcement on file endpoints.

  2. If no patch is available, restrict deployment access to fully trusted users via network ACLs or VPN gating.

  3. Audit application logs for anomalous GET /api/v1/files/ enumeration (bulk listing requests from non-admin accounts).

  4. Treat all documents previously uploaded to the instance as potentially exfiltrated — assess based on data classification.

  5. Rotate credentials or tokens exposed in uploaded documents.

  6. Consider placing a WAF rule blocking unauthenticated or low-privilege access to the /api/v1/files/ endpoints.

CISA SSVC Assessment

Decision Attend
Exploitation poc
Automatable No
Technical Impact total

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Art.15 - Accuracy, robustness and cybersecurity
ISO 42001
A.9.4 - Technical access control for AI systems
NIST AI RMF
MANAGE-2.2 - Risk responses for AI systems include technical controls to prevent unauthorized access
OWASP LLM Top 10
LLM06:2023 - Sensitive Information Disclosure

Frequently Asked Questions

What is CVE-2024-7043?

Any authenticated user on open-webui v0.3.8 can enumerate, read, and delete files uploaded by all other users via unauthenticated API calls — no admin role required. If your org runs this version as an internal LLM frontend, treat all previously uploaded documents as potentially compromised. Upgrade immediately or isolate the deployment to fully trusted users pending a verified patch.

Is CVE-2024-7043 actively exploited?

No confirmed active exploitation of CVE-2024-7043 has been reported, but organizations should still patch proactively.

How to fix CVE-2024-7043?

1. Upgrade open-webui to a patched version above v0.3.8 immediately — verify the changelog confirms authorization enforcement on file endpoints. 2. If no patch is available, restrict deployment access to fully trusted users via network ACLs or VPN gating. 3. Audit application logs for anomalous GET /api/v1/files/ enumeration (bulk listing requests from non-admin accounts). 4. Treat all documents previously uploaded to the instance as potentially exfiltrated — assess based on data classification. 5. Rotate credentials or tokens exposed in uploaded documents. 6. Consider placing a WAF rule blocking unauthenticated or low-privilege access to the /api/v1/files/ endpoints.

What systems are affected by CVE-2024-7043?

This vulnerability affects the following AI/ML architecture patterns: AI chat interfaces, RAG pipelines, Document analysis workflows, Multi-user LLM deployments.

What is the CVSS score for CVE-2024-7043?

CVE-2024-7043 has a CVSS v3.1 base score of 8.1 (HIGH). The EPSS exploitation probability is 0.19%.

Technical Details

NVD Description

An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all files uploaded by users, which includes the ID values. The attacker can then use the GET /api/v1/files/{file_id} interface to obtain information on any file and the DELETE /api/v1/files/{file_id} interface to delete any file.

Exploitation Scenario

An attacker holding a standard user account on an internal open-webui deployment — such as a low-trust contractor or a compromised employee credential — issues a single GET /api/v1/files/ request. The API returns metadata and IDs for every file uploaded by every user in the system. The attacker scripts iteration over all returned file IDs, downloading full document contents via GET /api/v1/files/{file_id}. In under five minutes they harvest confidential documents submitted by colleagues for AI analysis: vendor contracts, architecture diagrams, HR records, API keys embedded in code snippets. They then selectively DELETE targeted files to remove evidence of sensitive data having been shared. No elevated privileges, no exploit code, no AI knowledge required.

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Timeline

Published
March 20, 2025
Last Modified
October 15, 2025
First Seen
March 24, 2026

Related Vulnerabilities