0.6.5
11 months ago
5 days ago
Known vulnerabilities in the open-webui package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
open-webui is an Open WebUI Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) through the authentication process using cookies with the How to fix Cross-site Request Forgery (CSRF)? Upgrade | [,0.3.33) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Arbitrary File Upload via the How to fix Arbitrary File Upload? Upgrade | [,0.5.17) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Denial of Service (DoS) via the endpoint for converting markdown. An attacker can cause the server to spend excessive time on processing, rendering it unresponsive to other requests until the conversion is complete. How to fix Denial of Service (DoS)? Upgrade | [,0.5.13) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Missing Authentication for Critical Function through the How to fix Missing Authentication for Critical Function? Upgrade | [,0.5.13) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Insufficient Isolation of System-Dependent Functions due to improper access control on the How to fix Insufficient Isolation of System-Dependent Functions? Upgrade | [,0.4.0) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the chat file upload functionality. An attacker can inject malicious scripts or content into a file, which, when accessed by a victim through a URL or shared chat, executes JavaScript in the victim's browser leading to potential user data theft, session hijacking, malware distribution, and phishing attacks. How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Directory Traversal through the How to fix Directory Traversal? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) through the Note: This is only exploitable when deployed on Windows. How to fix Arbitrary File Write via Archive Extraction (Zip Slip)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Cross-site Scripting (XSS). An attacker with a user-level account can manipulate session cookies to hijack administrator sessions, leading to unauthorized actions and potential system compromise by embedding a malicious markdown image in a chat, which, when viewed by an administrator, sends the admin's session cookie to the attacker's server. How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the How to fix Allocation of Resources Without Limits or Throttling? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Improper Privilege Management through the API endpoint How to fix Improper Privilege Management? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Undefined Behavior for Input to API due to improper access control on the Note: This is only exploitable if the attacker has network access to the application's API. How to fix Undefined Behavior for Input to API? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Incorrect Synchronization due to improper access control mechanisms. An attacker can view and delete any files by directly calling specific API endpoints without needing administrative privileges. This is only exploitable if the attacker has access to the network where the application is hosted. How to fix Incorrect Synchronization? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in tooltip content rendering. An attacker can perform operations with the victim's privileges, such as stealing chat history and deleting chats, by convincing the victim to interact with a malicious prompt. How to fix Cross-site Scripting (XSS)? Upgrade | [,0.3.24) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Path Traversal due to unsanitized input in the How to fix Path Traversal? Upgrade | [,0.5.0) |