CVE-2024-7046: Open WebUI: missing authz leaks admin credentials
GHSA-gv26-qw3h-8qvp MEDIUM PoC AVAILABLE CISA: TRACK*Any authenticated Open WebUI user can call /api/v1/auths/admin/details and retrieve the owner account details with no privilege check—one API call, done. Update beyond v0.3.8 immediately. If patching is delayed, block that endpoint at the reverse proxy layer for non-admin sessions and rotate admin credentials if exposure is suspected.
Risk Assessment
CVSS 4.3 undersells the practical risk in shared deployments. PR:L means any regular user account is enough to trigger this—common in team Open WebUI setups where multiple engineers have access. The attack requires zero AI/ML knowledge: one authenticated HTTP GET. EPSS is low (0.00063) indicating no current mass exploitation, but the simplicity of the vector makes this a low-effort opportunistic attack for insiders or anyone who compromises a low-privilege account first. Primary risk is admin account takeover enabling full control of the LLM-serving environment.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.3.8 | No patch |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
1 step-
1) Patch: Update Open WebUI to any version beyond 0.3.8—the fix adds proper authorization enforcement on /api/v1/auths/admin/details. 2) Workaround if patching is delayed: Configure nginx/Caddy to return 403 on /api/v1/auths/admin/details requests unless the session belongs to an admin role, or restrict to admin-only IP ranges. 3) Detection: Search web access logs for GET /api/v1/auths/admin/details calls from non-admin user sessions. Any hit from a regular user session is a confirmed exploitation attempt. 4) Credential hygiene: If exploitation is suspected, rotate admin password and audit all user accounts for unauthorized privilege changes. 5) Audit surface: Review all /api/v1/auths/* endpoints for similar missing authorization patterns—this class of bug often clusters.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7046?
Any authenticated Open WebUI user can call /api/v1/auths/admin/details and retrieve the owner account details with no privilege check—one API call, done. Update beyond v0.3.8 immediately. If patching is delayed, block that endpoint at the reverse proxy layer for non-admin sessions and rotate admin credentials if exposure is suspected.
Is CVE-2024-7046 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-7046, increasing the risk of exploitation.
How to fix CVE-2024-7046?
1) Patch: Update Open WebUI to any version beyond 0.3.8—the fix adds proper authorization enforcement on /api/v1/auths/admin/details. 2) Workaround if patching is delayed: Configure nginx/Caddy to return 403 on /api/v1/auths/admin/details requests unless the session belongs to an admin role, or restrict to admin-only IP ranges. 3) Detection: Search web access logs for GET /api/v1/auths/admin/details calls from non-admin user sessions. Any hit from a regular user session is a confirmed exploitation attempt. 4) Credential hygiene: If exploitation is suspected, rotate admin password and audit all user accounts for unauthorized privilege changes. 5) Audit surface: Review all /api/v1/auths/* endpoints for similar missing authorization patterns—this class of bug often clusters.
What systems are affected by CVE-2024-7046?
This vulnerability affects the following AI/ML architecture patterns: Self-hosted LLM serving, LLM admin panels, Internal AI gateways, Ollama/local model deployments.
What is the CVSS score for CVE-2024-7046?
CVE-2024-7046 has a CVSS v3.1 base score of 4.3 (MEDIUM). The EPSS exploitation probability is 0.15%.
Technical Details
NVD Description
An improper access control vulnerability in open-webui/open-webui v0.3.8 allows an attacker to view admin details. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/auths/admin/details interface to retrieve the first admin (owner) details.
Exploitation Scenario
A developer with a standard Open WebUI account on the company's internal LLM gateway (used for accessing Ollama with proprietary models) sends a single GET request to /api/v1/auths/admin/details using their existing session token. The server returns the admin email and account details without checking privileges. The attacker uses the admin email for targeted spearphishing or, if a password hash is in the response, attempts offline cracking. With admin access obtained, they reconfigure model system prompts to exfiltrate data from subsequent user queries, add a backdoor user account, or extract API keys for commercial LLM providers configured in the instance.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert