Any authenticated user on open-webui v0.3.8 can enumerate, read, and delete files uploaded by all other users via unauthenticated API calls — no admin role required. If your org runs this version as an internal LLM frontend, treat all previously uploaded documents as potentially compromised. Upgrade immediately or isolate the deployment to fully trusted users pending a verified patch.
Risk Assessment
High severity (CVSS 8.1) but low active exploitation probability (EPSS 0.0008). The vulnerability requires only a valid low-privilege account and zero AI/ML knowledge, making it trivially exploitable by any insider or compromised user account. Risk is amplified in multi-tenant or enterprise deployments where sensitive documents are routinely uploaded for LLM-assisted analysis — the attacker surface is every file every user has ever uploaded.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.3.8 | No patch |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Upgrade open-webui to a patched version above v0.3.8 immediately — verify the changelog confirms authorization enforcement on file endpoints.
-
If no patch is available, restrict deployment access to fully trusted users via network ACLs or VPN gating.
-
Audit application logs for anomalous GET /api/v1/files/ enumeration (bulk listing requests from non-admin accounts).
-
Treat all documents previously uploaded to the instance as potentially exfiltrated — assess based on data classification.
-
Rotate credentials or tokens exposed in uploaded documents.
-
Consider placing a WAF rule blocking unauthenticated or low-privilege access to the /api/v1/files/ endpoints.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7043?
Any authenticated user on open-webui v0.3.8 can enumerate, read, and delete files uploaded by all other users via unauthenticated API calls — no admin role required. If your org runs this version as an internal LLM frontend, treat all previously uploaded documents as potentially compromised. Upgrade immediately or isolate the deployment to fully trusted users pending a verified patch.
Is CVE-2024-7043 actively exploited?
No confirmed active exploitation of CVE-2024-7043 has been reported, but organizations should still patch proactively.
How to fix CVE-2024-7043?
1. Upgrade open-webui to a patched version above v0.3.8 immediately — verify the changelog confirms authorization enforcement on file endpoints. 2. If no patch is available, restrict deployment access to fully trusted users via network ACLs or VPN gating. 3. Audit application logs for anomalous GET /api/v1/files/ enumeration (bulk listing requests from non-admin accounts). 4. Treat all documents previously uploaded to the instance as potentially exfiltrated — assess based on data classification. 5. Rotate credentials or tokens exposed in uploaded documents. 6. Consider placing a WAF rule blocking unauthenticated or low-privilege access to the /api/v1/files/ endpoints.
What systems are affected by CVE-2024-7043?
This vulnerability affects the following AI/ML architecture patterns: AI chat interfaces, RAG pipelines, Document analysis workflows, Multi-user LLM deployments.
What is the CVSS score for CVE-2024-7043?
CVE-2024-7043 has a CVSS v3.1 base score of 8.1 (HIGH). The EPSS exploitation probability is 0.19%.
Technical Details
NVD Description
An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all files uploaded by users, which includes the ID values. The attacker can then use the GET /api/v1/files/{file_id} interface to obtain information on any file and the DELETE /api/v1/files/{file_id} interface to delete any file.
Exploitation Scenario
An attacker holding a standard user account on an internal open-webui deployment — such as a low-trust contractor or a compromised employee credential — issues a single GET /api/v1/files/ request. The API returns metadata and IDs for every file uploaded by every user in the system. The attacker scripts iteration over all returned file IDs, downloading full document contents via GET /api/v1/files/{file_id}. In under five minutes they harvest confidential documents submitted by colleagues for AI analysis: vendor contracts, architecture diagrams, HR records, API keys embedded in code snippets. They then selectively DELETE targeted files to remove evidence of sensitive data having been shared. No elevated privileges, no exploit code, no AI knowledge required.
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert