CVE-2024-7048: CWE-863 Incorrect Authorization in open-webui open-webui/open-webui
In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models.
AI Analysis
Technical Summary
CVE-2024-7048 identifies an improper authorization vulnerability (CWE-863) in open-webui version v0.3.8, specifically affecting the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability arises from insufficient privilege checks, allowing users with lower privileges to access metadata of files uploaded by administrators and to overwrite these files. The affected files are related to Retrieval-Augmented Generation (RAG) models, which are critical for AI-driven document retrieval and processing. By exploiting this flaw, an attacker compromises the integrity and availability of these models, potentially leading to corrupted data, denial of service, or manipulation of AI outputs. The vulnerability requires network access and low privileges but does not require user interaction, making it easier to exploit remotely. The CVSS 3.0 base score is 6.3 (medium severity), reflecting the moderate confidentiality, integrity, and availability impacts combined with low attack complexity and no user interaction. No patches or mitigations have been officially released yet, and no known exploits are reported in the wild. The vulnerability highlights a critical gap in access control mechanisms within open-webui's API design, emphasizing the need for robust authorization enforcement in AI model management platforms.
Potential Impact
For European organizations leveraging open-webui for AI document management or RAG model deployment, this vulnerability poses a significant risk to data integrity and service availability. Attackers exploiting this flaw can overwrite critical AI model files, potentially causing incorrect AI outputs, service disruptions, or data loss. This can undermine trust in AI-driven processes and lead to operational downtime. Confidentiality impact is limited to metadata exposure, but integrity and availability impacts are more severe. Organizations in sectors relying heavily on AI for decision-making, such as finance, healthcare, and research institutions, may face operational and reputational damage. Additionally, the ease of exploitation without user interaction increases the risk of automated attacks. The absence of patches means organizations must rely on compensating controls until a fix is available. Given the growing adoption of AI tools in Europe, the vulnerability could affect a broad range of entities, especially those using open-source AI frameworks.
Mitigation Recommendations
1. Immediately restrict access to the vulnerable API endpoints (GET /api/v1/documents/ and POST /rag/api/v1/doc) to trusted and authenticated users only, preferably via network segmentation or firewall rules. 2. Implement strict role-based access control (RBAC) and verify that authorization checks are enforced server-side for all API requests, ensuring that lower-privileged users cannot access or modify admin-managed files. 3. Monitor API usage logs for unusual access patterns or unauthorized attempts to access or overwrite files. 4. If possible, disable or isolate the RAG model management features until a patch is available. 5. Engage with the open-webui community or vendor to track patch releases and apply updates promptly once available. 6. Conduct internal audits of AI model file permissions and integrity to detect any unauthorized changes. 7. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block suspicious API calls targeting these endpoints. 8. Educate administrators and developers about the importance of secure API design and privilege separation in AI platforms.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland
CVE-2024-7048: CWE-863 Incorrect Authorization in open-webui open-webui/open-webui
Description
In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models.
AI-Powered Analysis
Technical Analysis
CVE-2024-7048 identifies an improper authorization vulnerability (CWE-863) in open-webui version v0.3.8, specifically affecting the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability arises from insufficient privilege checks, allowing users with lower privileges to access metadata of files uploaded by administrators and to overwrite these files. The affected files are related to Retrieval-Augmented Generation (RAG) models, which are critical for AI-driven document retrieval and processing. By exploiting this flaw, an attacker compromises the integrity and availability of these models, potentially leading to corrupted data, denial of service, or manipulation of AI outputs. The vulnerability requires network access and low privileges but does not require user interaction, making it easier to exploit remotely. The CVSS 3.0 base score is 6.3 (medium severity), reflecting the moderate confidentiality, integrity, and availability impacts combined with low attack complexity and no user interaction. No patches or mitigations have been officially released yet, and no known exploits are reported in the wild. The vulnerability highlights a critical gap in access control mechanisms within open-webui's API design, emphasizing the need for robust authorization enforcement in AI model management platforms.
Potential Impact
For European organizations leveraging open-webui for AI document management or RAG model deployment, this vulnerability poses a significant risk to data integrity and service availability. Attackers exploiting this flaw can overwrite critical AI model files, potentially causing incorrect AI outputs, service disruptions, or data loss. This can undermine trust in AI-driven processes and lead to operational downtime. Confidentiality impact is limited to metadata exposure, but integrity and availability impacts are more severe. Organizations in sectors relying heavily on AI for decision-making, such as finance, healthcare, and research institutions, may face operational and reputational damage. Additionally, the ease of exploitation without user interaction increases the risk of automated attacks. The absence of patches means organizations must rely on compensating controls until a fix is available. Given the growing adoption of AI tools in Europe, the vulnerability could affect a broad range of entities, especially those using open-source AI frameworks.
Mitigation Recommendations
1. Immediately restrict access to the vulnerable API endpoints (GET /api/v1/documents/ and POST /rag/api/v1/doc) to trusted and authenticated users only, preferably via network segmentation or firewall rules. 2. Implement strict role-based access control (RBAC) and verify that authorization checks are enforced server-side for all API requests, ensuring that lower-privileged users cannot access or modify admin-managed files. 3. Monitor API usage logs for unusual access patterns or unauthorized attempts to access or overwrite files. 4. If possible, disable or isolate the RAG model management features until a patch is available. 5. Engage with the open-webui community or vendor to track patch releases and apply updates promptly once available. 6. Conduct internal audits of AI model file permissions and integrity to detect any unauthorized changes. 7. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block suspicious API calls targeting these endpoints. 8. Educate administrators and developers about the importance of secure API design and privilege separation in AI platforms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-07-23T19:08:19.449Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2b178f764e1f470d88
Added to database: 10/15/2025, 1:01:31 PM
Last enriched: 10/15/2025, 1:35:56 PM
Last updated: 10/16/2025, 2:50:59 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41253: CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in VMware Spring Cloud Gateway Server Webflux
HighMicrosoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
MediumCVE-2025-54658: Escalation of privilege in Fortinet FortiDLP
HighCVE-2025-53951: Escalation of privilege in Fortinet FortiDLP
MediumCVE-2025-53950: Information disclosure in Fortinet FortiDLP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.