Cyber Posture

CVE-2024-7043

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
15 October 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-7043 is a high-severity Missing Authorization (CWE-862) vulnerability in Openwebui Open Webui. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 40.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Enterprise AI Assistants; in the Data-Related Vulnerabilities risk domain.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 mandates enforcement of approved authorizations for access to system resources, directly addressing the lack of admin verification on file listing, viewing, and deletion APIs.

prevent

AC-6 enforces least privilege, preventing low-privileged attackers from accessing or deleting files reserved for administrators.

prevent

AC-24 requires access control decisions based on policy, mitigating unauthorized file operations by ensuring proper authorization checks before granting access.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

The improper access control vulnerability allows unauthorized attackers to list all files (T1083), retrieve file contents (T1005), and delete any files (T1070.004).

NVD Description

An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information…

more

on all files uploaded by users, which includes the ID values. The attacker can then use the GET /api/v1/files/{file_id} interface to obtain information on any file and the DELETE /api/v1/files/{file_id} interface to delete any file.

Deeper analysisAI

CVE-2024-7043 is an improper access control vulnerability (CWE-862) in open-webui/open-webui version 0.3.8. The issue stems from the application failing to verify whether a user is an administrator before allowing access to file management functions. Attackers can directly invoke the GET /api/v1/files/ endpoint to retrieve information on all files uploaded by users, including their ID values.

A low-privileged remote attacker (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). By first listing all files via GET /api/v1/files/, the attacker obtains file IDs, then uses GET /api/v1/files/{file_id} to view any file's contents and DELETE /api/v1/files/{file_id} to delete it. This results in high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H), as reflected in the CVSS v3.1 base score of 8.8.

Mitigation details and additional information are available in the advisory published on Huntr at https://huntr.com/bounties/c01e0c7f-68d8-45cf-91d2-521c97f33b00. The vulnerability was published on 2025-03-20.

Details

CWE(s)

Affected Products

openwebui
open webui
0.3.8

AI Security AnalysisAI

AI Category
Enterprise AI Assistants
Risk Domain
Data-Related Vulnerabilities
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Open WebUI is a self-hosted web interface for LLMs (e.g., Ollama, OpenAI-compatible APIs), functioning as an enterprise-grade AI assistant platform. The vulnerability affects its file management APIs, which handle user-uploaded files for AI interactions like RAG.

CVEs Like This One

CVE-2026-29070Same product: Openwebui Open Webui
CVE-2024-7959Same product: Openwebui Open Webui
CVE-2024-8053Same product: Openwebui Open Webui
CVE-2024-7806Same product: Openwebui Open Webui
CVE-2024-7036Same product: Openwebui Open Webui
CVE-2024-7044Same product: Openwebui Open Webui
CVE-2024-7034Same product: Openwebui Open Webui
CVE-2024-12537Same product: Openwebui Open Webui
CVE-2026-26192Same product: Openwebui Open Webui
CVE-2026-34222Same product: Openwebui Open Webui

References