Cyber Posture

CVE-2024-7044

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
29 July 2025
KEV Added
Patch
CVSS Score 8.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
EPSS Score 0.0015 35.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-7044 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Openwebui Open Webui. Its CVSS base score is 8.9 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 35.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Enterprise AI Assistants; in the Other ATLAS/OWASP Terms risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Drive-by Compromise (T1189) and 5 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-15 directly prevents stored XSS execution by filtering malicious JavaScript from uploaded file contents before rendering or sharing in the victim's browser.

prevent

SI-10 addresses the root cause by validating and sanitizing inputs during file uploads to block injection of malicious scripts.

prevent

SI-2 ensures timely identification, reporting, and patching of the specific stored XSS flaw in the chat file upload functionality.

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1555.003 Credentials from Web Browsers Credential Access
Adversaries may acquire credentials from web browsers by reading files specific to the target browser.
Why these techniques?

Stored XSS via malicious file upload enables arbitrary JS execution in victims' browsers upon access via URL/shared chat, facilitating drive-by compromise, public-facing app exploitation, JavaScript execution, browser session hijacking, web session cookie theft, and browser credential theft.

NVD Description

A Stored Cross-Site Scripting (XSS) vulnerability exists in the chat file upload functionality of open-webui/open-webui version 0.3.8. An attacker can inject malicious content into a file, which, when accessed by a victim through a URL or shared chat, executes JavaScript…

more

in the victim's browser. This can lead to user data theft, session hijacking, malware distribution, and phishing attacks.

Deeper analysisAI

CVE-2024-7044 is a Stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, in the chat file upload functionality of open-webui/open-webui version 0.3.8. Published on 2025-03-20, it carries a CVSS v3.1 base score of 8.9 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L). The flaw allows an attacker to inject malicious content into an uploaded file, which persists and executes JavaScript when accessed.

An authenticated attacker with low privileges (PR:L) can exploit this by uploading a specially crafted file to the chat interface. When a victim user interacts with the file via a direct URL or shared chat, the injected JavaScript executes in the victim's browser context due to insufficient input sanitization. Successful exploitation enables theft of sensitive user data, session hijacking, malware distribution, and phishing attacks, with high confidentiality and integrity impacts across a changed scope.

Mitigation details and patches are outlined in the primary advisory at https://huntr.com/bounties/c25a885c-d6e2-4169-9ee8-4d33bcbb5ef6. Security practitioners should review this reference for upgrade instructions and workarounds specific to open-webui deployments.

Details

CWE(s)

Affected Products

openwebui
open webui
0.3.8

AI Security AnalysisAI

AI Category
Enterprise AI Assistants
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Open WebUI is a web-based user interface for interacting with LLMs and AI models (e.g., via Ollama or OpenAI-compatible APIs), fitting the Enterprise AI Assistants category. The vulnerability is in its chat file upload feature, part of an AI chat platform, and listed on an AI/ML bug bounty platform.

CVEs Like This One

CVE-2026-26192Same product: Openwebui Open Webui
CVE-2026-26193Same product: Openwebui Open Webui
CVE-2024-7053Same product: Openwebui Open Webui
CVE-2024-7806Same product: Openwebui Open Webui
CVE-2024-7959Same product: Openwebui Open Webui
CVE-2024-8053Same product: Openwebui Open Webui
CVE-2024-7034Same product: Openwebui Open Webui
CVE-2024-7036Same product: Openwebui Open Webui
CVE-2024-7043Same product: Openwebui Open Webui
CVE-2026-34222Same product: Openwebui Open Webui

References