CVE-2024-7959: Open-WebUI: SSRF via unchecked OpenAI URL leaks internal secrets
GHSA-x757-hv69-jr45 HIGH PoC AVAILABLE CISA: TRACK*Any authenticated user of open-webui <=0.3.8 can redirect the /openai/models endpoint to arbitrary internal URLs, effectively turning your LLM interface into a proxy to your internal network. In cloud deployments this means instant access to instance metadata endpoints (AWS IMDSv1, GCP/Azure IMDS) and the credentials they carry. Restrict open-webui access to trusted users immediately and upgrade as soon as a patch is available.
Risk Assessment
CVSS 7.7 High with Scope:Changed — the vulnerability crosses trust boundaries from the application tier into internal infrastructure. Low complexity and only low privileges required makes this accessible to any authenticated user, not just admins. EPSS is low (0.35%) suggesting limited current exploitation, but the attack path is trivial and the blast radius in cloud environments is severe due to IMDS credential harvesting potential.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.3.8 | No patch |
| open_webui | — | — | No patch |
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Upgrade open-webui beyond 0.3.8 immediately; verify fix in release notes before upgrading.
-
If patching is not yet possible, block or require admin-only access to the OpenAI URL configuration setting.
-
Enforce IMDSv2 (AWS) or equivalent on all cloud instances running open-webui to mitigate metadata endpoint abuse.
-
Apply egress filtering on the open-webui container/host to restrict outbound HTTP to approved AI API endpoints only.
-
Detect exploitation by monitoring application logs for /openai/models requests targeting non-standard hosts (anything not api.openai.com or your approved LLM endpoint).
-
Audit existing deployments for any unexpected outbound connections from the open-webui host.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7959?
Any authenticated user of open-webui <=0.3.8 can redirect the /openai/models endpoint to arbitrary internal URLs, effectively turning your LLM interface into a proxy to your internal network. In cloud deployments this means instant access to instance metadata endpoints (AWS IMDSv1, GCP/Azure IMDS) and the credentials they carry. Restrict open-webui access to trusted users immediately and upgrade as soon as a patch is available.
Is CVE-2024-7959 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-7959, increasing the risk of exploitation.
How to fix CVE-2024-7959?
1. Upgrade open-webui beyond 0.3.8 immediately; verify fix in release notes before upgrading. 2. If patching is not yet possible, block or require admin-only access to the OpenAI URL configuration setting. 3. Enforce IMDSv2 (AWS) or equivalent on all cloud instances running open-webui to mitigate metadata endpoint abuse. 4. Apply egress filtering on the open-webui container/host to restrict outbound HTTP to approved AI API endpoints only. 5. Detect exploitation by monitoring application logs for /openai/models requests targeting non-standard hosts (anything not api.openai.com or your approved LLM endpoint). 6. Audit existing deployments for any unexpected outbound connections from the open-webui host.
What systems are affected by CVE-2024-7959?
This vulnerability affects the following AI/ML architecture patterns: LLM API gateways, model serving, agent frameworks, self-hosted AI platforms.
What is the CVSS score for CVE-2024-7959?
CVE-2024-7959 has a CVSS v3.1 base score of 7.7 (HIGH). The EPSS exploitation probability is 0.51%.
Technical Details
NVD Description
The `/openai/models` endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and return the output. This vulnerability allows the attacker to access internal services and potentially gain command execution by accessing instance secrets.
Exploitation Scenario
An attacker with a low-privilege open-webui account navigates to the OpenAI API configuration and changes the base URL to http://169.254.169.254/latest/meta-data/iam/security-credentials/ (AWS IMDS). They then trigger the /openai/models endpoint, which proxies the request and returns the AWS IAM role credentials in the response. With those credentials the attacker can exfiltrate training data from S3, access connected AI services (Bedrock, SageMaker), or pivot laterally across the cloud environment. In non-cloud environments, the same technique enumerates internal services, databases, or Kubernetes API servers.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert