CVE-2024-7045: open-webui: missing authz exposes admin prompts
GHSA-c7fq-p62p-wvpc MEDIUM PoC AVAILABLE CISA: TRACK*Any authenticated user on your Open WebUI instance can enumerate and read all admin-created prompts via unauthenticated API calls — no admin rights required. If your internal LLM deployment uses Open WebUI and prompts contain sensitive instructions, business logic, or security policies, those are now accessible to any user with a valid account. Upgrade beyond v0.3.8 immediately and audit your prompt library for sensitive content.
Risk Assessment
Medium severity in isolation, but contextually higher in enterprise LLM deployments. The attack requires only a valid low-privilege account (CVSS PR:L), making it accessible to any internal user or compromised account. EPSS of 0.00063 indicates low active exploitation probability, but the trivial exploitation path lowers the practical barrier significantly. The actual impact depends heavily on what admin prompts contain — in many organizations, system prompts encode sensitive operational context, tool configurations, or policy instructions that should not be broadly accessible.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.3.8 | No patch |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Upgrade: Update open-webui beyond v0.3.8; no official patch was tagged at disclosure — monitor the GitHub repo for a patched release.
-
Restrict access: Limit Open WebUI to trusted users only; remove unused or overly broad accounts immediately.
-
Audit prompts: Review all admin-created prompts for sensitive content (credentials, API keys, internal policies, PII, RAG data source details) and sanitize as needed.
-
Detect: Monitor access logs for unusual GET request volume to /api/v1/prompts/ and /api/v1/prompts/command/ from non-admin accounts.
-
Isolate: If no patch is available, place Open WebUI behind a VPN or IP allowlist to minimize exposure surface.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7045?
Any authenticated user on your Open WebUI instance can enumerate and read all admin-created prompts via unauthenticated API calls — no admin rights required. If your internal LLM deployment uses Open WebUI and prompts contain sensitive instructions, business logic, or security policies, those are now accessible to any user with a valid account. Upgrade beyond v0.3.8 immediately and audit your prompt library for sensitive content.
Is CVE-2024-7045 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-7045, increasing the risk of exploitation.
How to fix CVE-2024-7045?
1. Upgrade: Update open-webui beyond v0.3.8; no official patch was tagged at disclosure — monitor the GitHub repo for a patched release. 2. Restrict access: Limit Open WebUI to trusted users only; remove unused or overly broad accounts immediately. 3. Audit prompts: Review all admin-created prompts for sensitive content (credentials, API keys, internal policies, PII, RAG data source details) and sanitize as needed. 4. Detect: Monitor access logs for unusual GET request volume to /api/v1/prompts/ and /api/v1/prompts/command/ from non-admin accounts. 5. Isolate: If no patch is available, place Open WebUI behind a VPN or IP allowlist to minimize exposure surface.
What systems are affected by CVE-2024-7045?
This vulnerability affects the following AI/ML architecture patterns: LLM chat interfaces, Internal AI portals, Agent frameworks, Model serving.
What is the CVSS score for CVE-2024-7045?
CVE-2024-7045 has a CVSS v3.1 base score of 4.3 (MEDIUM). The EPSS exploitation probability is 0.17%.
Technical Details
NVD Description
In version v0.3.8 of open-webui/open-webui, improper access control vulnerabilities allow an attacker to view any prompts. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/prompts/ interface to retrieve all prompt information created by the admin, which includes the ID values. Subsequently, the attacker can exploit the /api/v1/prompts/command/{command_id} interface to obtain arbitrary prompt information.
Exploitation Scenario
An attacker with a low-privilege Open WebUI account — a compromised employee credential, a trial account on a misconfigured deployment, or an insider — sends a GET request to /api/v1/prompts/ with their session token. The endpoint returns all admin-created prompts including their command IDs without verifying the requester is an admin. The attacker iterates over each ID, calling /api/v1/prompts/command/{command_id} to retrieve full prompt content. Depending on what prompts contain, this could expose system prompt engineering, organizational AI usage policies, RAG data source configurations, or agentic tool instructions — providing intelligence for more sophisticated follow-on attacks against the AI system or the organization.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert