Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8060: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in open-webui open-webui/open-webui

0
High
VulnerabilityCVE-2024-8060cvecve-2024-8060cwe-22
Published: Thu Mar 20 2025 (03/20/2025, 10:09:48 UTC)
Source: CVE Database V5
Vendor/Project: open-webui
Product: open-webui/open-webui

Description

OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint `/audio/api/v1/transcriptions` that allows for arbitrary file upload. The application performs insufficient validation on the `file.content_type` and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:21:26 UTC

Technical Analysis

CVE-2024-8060 is a path traversal vulnerability classified under CWE-22 found in OpenWebUI version 0.3.0, specifically in the audio API endpoint `/audio/api/v1/transcriptions`. The vulnerability arises due to insufficient validation of the `file.content_type` and user-controlled filenames during file uploads. This flaw allows an authenticated attacker to craft malicious filenames that traverse directories and overwrite arbitrary files within the Docker container hosting OpenWebUI. Because the application runs inside a Docker container, overwriting critical files can lead to remote code execution with root privileges, effectively compromising the container and potentially the host system if Docker is misconfigured. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (AV:N). The CVSS v3.0 score is 8.1, indicating high severity, with low attack complexity and no user interaction required. Although no known exploits have been reported in the wild, the potential impact is significant due to the ability to execute arbitrary code as root. The vulnerability highlights the importance of strict input validation and secure handling of file uploads, especially in containerized environments where file system boundaries must be enforced. No patches are currently listed, so organizations must implement compensating controls until an official fix is released.

Potential Impact

For European organizations, the impact of CVE-2024-8060 can be severe. Successful exploitation allows attackers to overwrite critical files and execute arbitrary code with root privileges inside the Docker container, potentially leading to full system compromise. This threatens confidentiality, integrity, and availability of affected systems. Organizations using OpenWebUI in production, particularly in sensitive sectors such as finance, healthcare, or critical infrastructure, could face data breaches, service disruptions, and regulatory compliance violations under GDPR. The containerized deployment model may limit lateral movement if properly isolated, but misconfigurations could allow attackers to escape the container and compromise host systems. The requirement for authentication reduces the attack surface but insider threats or compromised credentials could facilitate exploitation. The lack of known exploits suggests a window for proactive mitigation, but also means organizations should prioritize monitoring for suspicious activity related to file uploads and container integrity.

Mitigation Recommendations

1. Immediately restrict access to the OpenWebUI audio API endpoint to trusted users and networks. 2. Implement strict validation on uploaded file names to disallow path traversal characters such as '../' and enforce whitelisting of allowed file extensions and content types. 3. Use container security best practices: run containers with least privilege, disable root user execution where possible, and apply read-only file system mounts for critical directories. 4. Monitor file system changes within containers and audit logs for unusual file upload activity. 5. Employ network segmentation to isolate OpenWebUI containers from sensitive internal systems. 6. Regularly rotate and enforce strong authentication credentials to reduce risk of compromised accounts. 7. Stay alert for official patches or updates from the OpenWebUI project and apply them promptly once available. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts targeting the vulnerable endpoint. 9. Conduct penetration testing and vulnerability scanning focused on file upload functionalities to identify similar weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-08-21T18:23:05.803Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2c178f764e1f470df4

Added to database: 10/15/2025, 1:01:32 PM

Last enriched: 10/15/2025, 1:21:26 PM

Last updated: 10/15/2025, 6:20:28 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats