CVE-2024-7806: Open-WebUI: CSRF enables RCE via pipeline code injection
GHSA-85jc-8h5p-8vw8 HIGH PoC AVAILABLE CISA: ATTENDAny organization running Open-WebUI as an internal AI interface should patch to 0.3.33 immediately — this is a no-interaction-on-the-server-side RCE reachable by tricking any authenticated user into visiting a malicious page. The blast radius is full code execution with the victim's privileges on your AI pipeline infrastructure. If you cannot patch today, restrict Open-WebUI access to trusted network segments and enforce browser-level controls to limit cross-origin requests.
Risk Assessment
High risk for organizations running Open-WebUI as a shared internal AI frontend. CVSS 8.0 reflects network-accessible exploitation with low privilege requirements — any authenticated user's session can be weaponized. The EPSS of 0.75% is likely underweighted given the trivial exploit complexity: CSRF against a SameSite=lax cookie is a well-documented attack pattern requiring no AI/ML expertise. The pipeline code modification primitive converts what could be a limited CSRF into full arbitrary code execution, dramatically elevating real-world impact beyond the base score suggests.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | < 0.3.33 | 0.3.33 |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Upgrade open-webui to >= 0.3.33 immediately.
-
NETWORK ISOLATION
Until patched, restrict Open-WebUI to internal-only access via VPN or allowlisted IPs — this eliminates the cross-origin request vector.
-
SESSION HARDENING
Verify your deployment sets SameSite=Strict on auth cookies post-upgrade; do not rely on lax.
-
DETECTION
Review pipeline modification logs for unexpected changes to Python code, particularly from non-admin accounts. Alert on pipeline edits outside normal business hours or from unusual source IPs.
-
AUDIT
Enumerate all Open-WebUI deployments in your environment — this is commonly spun up ad-hoc by teams experimenting with local LLMs.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7806?
Any organization running Open-WebUI as an internal AI interface should patch to 0.3.33 immediately — this is a no-interaction-on-the-server-side RCE reachable by tricking any authenticated user into visiting a malicious page. The blast radius is full code execution with the victim's privileges on your AI pipeline infrastructure. If you cannot patch today, restrict Open-WebUI access to trusted network segments and enforce browser-level controls to limit cross-origin requests.
Is CVE-2024-7806 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-7806, increasing the risk of exploitation.
How to fix CVE-2024-7806?
1. PATCH: Upgrade open-webui to >= 0.3.33 immediately. 2. NETWORK ISOLATION: Until patched, restrict Open-WebUI to internal-only access via VPN or allowlisted IPs — this eliminates the cross-origin request vector. 3. SESSION HARDENING: Verify your deployment sets SameSite=Strict on auth cookies post-upgrade; do not rely on lax. 4. DETECTION: Review pipeline modification logs for unexpected changes to Python code, particularly from non-admin accounts. Alert on pipeline edits outside normal business hours or from unusual source IPs. 5. AUDIT: Enumerate all Open-WebUI deployments in your environment — this is commonly spun up ad-hoc by teams experimenting with local LLMs.
What systems are affected by CVE-2024-7806?
This vulnerability affects the following AI/ML architecture patterns: LLM serving frontends, AI pipeline orchestration, Multi-user AI gateways, Local LLM deployments, Agent frameworks.
What is the CVSS score for CVE-2024-7806?
CVE-2024-7806 has a CVSS v3.1 base score of 8.0 (HIGH). The EPSS exploitation probability is 1.78%.
Technical Details
NVD Description
A vulnerability in open-webui/open-webui versions <= 0.3.8 allows remote code execution by non-admin users via Cross-Site Request Forgery (CSRF). The application uses cookies with the SameSite attribute set to lax for authentication and lacks CSRF tokens. This allows an attacker to craft a malicious HTML that, when accessed by a victim, can modify the Python code of an existing pipeline and execute arbitrary code with the victim's privileges.
Exploitation Scenario
An attacker with a foothold in an organization (or conducting a targeted external attack) identifies an Open-WebUI instance accessible to the victim. They craft a malicious HTML page that silently sends a cross-site POST request to the Open-WebUI pipeline edit endpoint, injecting a Python reverse shell or credential harvester into an existing pipeline definition. The attacker social-engineers the victim — a developer or data scientist who regularly uses Open-WebUI — into visiting the page (phishing email, poisoned internal wiki link, Slack message). The victim's browser automatically sends their Open-WebUI session cookie with the request. The pipeline is silently modified, and on the next pipeline execution, the attacker's code runs with the victim's privileges — gaining access to LLM API keys, model files, and network-adjacent resources.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H References
- github.com/advisories/GHSA-85jc-8h5p-8vw8
- github.com/open-webui/open-webui/blob/1d20c27553f019477f01d7233ebe40b11d31e479/backend/main.py
- github.com/open-webui/open-webui/commit/7e253df17593bc12dc5cc89d28703675f05b0158
- github.com/open-webui/open-webui/pull/6054
- huntr.com/bounties/9350a68d-5f33-4b3d-988b-81e778160ab8
- nvd.nist.gov/vuln/detail/CVE-2024-7806
- github.com/TheUnknownSoul/CVE-2024-7808 Exploit
- github.com/lambdasawa/_lambdasawa Exploit
- github.com/lambdasawa/lambdasawa Exploit
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert