CVE-2024-8060: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in open-webui open-webui/open-webui
OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint `/audio/api/v1/transcriptions` that allows for arbitrary file upload. The application performs insufficient validation on the `file.content_type` and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.
AI Analysis
Technical Summary
CVE-2024-8060 is a path traversal vulnerability classified under CWE-22 found in OpenWebUI version 0.3.0, specifically in the audio API endpoint `/audio/api/v1/transcriptions`. The vulnerability arises due to insufficient validation of the `file.content_type` and user-controlled filenames during file uploads. This flaw allows an authenticated attacker to craft malicious filenames that traverse directories and overwrite arbitrary files within the Docker container hosting OpenWebUI. Because the application runs inside a Docker container, overwriting critical files can lead to remote code execution with root privileges, effectively compromising the container and potentially the host system if Docker is misconfigured. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (AV:N). The CVSS v3.0 score is 8.1, indicating high severity, with low attack complexity and no user interaction required. Although no known exploits have been reported in the wild, the potential impact is significant due to the ability to execute arbitrary code as root. The vulnerability highlights the importance of strict input validation and secure handling of file uploads, especially in containerized environments where file system boundaries must be enforced. No patches are currently listed, so organizations must implement compensating controls until an official fix is released.
Potential Impact
For European organizations, the impact of CVE-2024-8060 can be severe. Successful exploitation allows attackers to overwrite critical files and execute arbitrary code with root privileges inside the Docker container, potentially leading to full system compromise. This threatens confidentiality, integrity, and availability of affected systems. Organizations using OpenWebUI in production, particularly in sensitive sectors such as finance, healthcare, or critical infrastructure, could face data breaches, service disruptions, and regulatory compliance violations under GDPR. The containerized deployment model may limit lateral movement if properly isolated, but misconfigurations could allow attackers to escape the container and compromise host systems. The requirement for authentication reduces the attack surface but insider threats or compromised credentials could facilitate exploitation. The lack of known exploits suggests a window for proactive mitigation, but also means organizations should prioritize monitoring for suspicious activity related to file uploads and container integrity.
Mitigation Recommendations
1. Immediately restrict access to the OpenWebUI audio API endpoint to trusted users and networks. 2. Implement strict validation on uploaded file names to disallow path traversal characters such as '../' and enforce whitelisting of allowed file extensions and content types. 3. Use container security best practices: run containers with least privilege, disable root user execution where possible, and apply read-only file system mounts for critical directories. 4. Monitor file system changes within containers and audit logs for unusual file upload activity. 5. Employ network segmentation to isolate OpenWebUI containers from sensitive internal systems. 6. Regularly rotate and enforce strong authentication credentials to reduce risk of compromised accounts. 7. Stay alert for official patches or updates from the OpenWebUI project and apply them promptly once available. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts targeting the vulnerable endpoint. 9. Conduct penetration testing and vulnerability scanning focused on file upload functionalities to identify similar weaknesses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-8060: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in open-webui open-webui/open-webui
Description
OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint `/audio/api/v1/transcriptions` that allows for arbitrary file upload. The application performs insufficient validation on the `file.content_type` and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.
AI-Powered Analysis
Technical Analysis
CVE-2024-8060 is a path traversal vulnerability classified under CWE-22 found in OpenWebUI version 0.3.0, specifically in the audio API endpoint `/audio/api/v1/transcriptions`. The vulnerability arises due to insufficient validation of the `file.content_type` and user-controlled filenames during file uploads. This flaw allows an authenticated attacker to craft malicious filenames that traverse directories and overwrite arbitrary files within the Docker container hosting OpenWebUI. Because the application runs inside a Docker container, overwriting critical files can lead to remote code execution with root privileges, effectively compromising the container and potentially the host system if Docker is misconfigured. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (AV:N). The CVSS v3.0 score is 8.1, indicating high severity, with low attack complexity and no user interaction required. Although no known exploits have been reported in the wild, the potential impact is significant due to the ability to execute arbitrary code as root. The vulnerability highlights the importance of strict input validation and secure handling of file uploads, especially in containerized environments where file system boundaries must be enforced. No patches are currently listed, so organizations must implement compensating controls until an official fix is released.
Potential Impact
For European organizations, the impact of CVE-2024-8060 can be severe. Successful exploitation allows attackers to overwrite critical files and execute arbitrary code with root privileges inside the Docker container, potentially leading to full system compromise. This threatens confidentiality, integrity, and availability of affected systems. Organizations using OpenWebUI in production, particularly in sensitive sectors such as finance, healthcare, or critical infrastructure, could face data breaches, service disruptions, and regulatory compliance violations under GDPR. The containerized deployment model may limit lateral movement if properly isolated, but misconfigurations could allow attackers to escape the container and compromise host systems. The requirement for authentication reduces the attack surface but insider threats or compromised credentials could facilitate exploitation. The lack of known exploits suggests a window for proactive mitigation, but also means organizations should prioritize monitoring for suspicious activity related to file uploads and container integrity.
Mitigation Recommendations
1. Immediately restrict access to the OpenWebUI audio API endpoint to trusted users and networks. 2. Implement strict validation on uploaded file names to disallow path traversal characters such as '../' and enforce whitelisting of allowed file extensions and content types. 3. Use container security best practices: run containers with least privilege, disable root user execution where possible, and apply read-only file system mounts for critical directories. 4. Monitor file system changes within containers and audit logs for unusual file upload activity. 5. Employ network segmentation to isolate OpenWebUI containers from sensitive internal systems. 6. Regularly rotate and enforce strong authentication credentials to reduce risk of compromised accounts. 7. Stay alert for official patches or updates from the OpenWebUI project and apply them promptly once available. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts targeting the vulnerable endpoint. 9. Conduct penetration testing and vulnerability scanning focused on file upload functionalities to identify similar weaknesses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-08-21T18:23:05.803Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2c178f764e1f470df4
Added to database: 10/15/2025, 1:01:32 PM
Last enriched: 10/15/2025, 1:21:26 PM
Last updated: 10/15/2025, 6:20:28 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-6592: CWE-306 Missing Authentication for Critical Function in WatchGuard Authentication Gateway
CriticalCVE-2025-62410: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in capricorn86 happy-dom
CriticalCVE-2025-62371: CWE-295: Improper Certificate Validation in opensearch-project data-prepper
HighCVE-2025-62382: CWE-73: External Control of File Name or Path in blakeblackshear frigate
HighCVE-2025-62381: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in ciscoheat sveltekit-superforms
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.