0.6.5
11 months ago
5 days ago
Known vulnerabilities in the open-webui package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
open-webui is an Open WebUI Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the chat file upload functionality. An attacker can inject malicious scripts or content into a file, which, when accessed by a victim through a URL or shared chat, executes JavaScript in the victim's browser leading to potential user data theft, session hijacking, malware distribution, and phishing attacks. How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Directory Traversal through the How to fix Directory Traversal? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) through the Note: This is only exploitable when deployed on Windows. How to fix Arbitrary File Write via Archive Extraction (Zip Slip)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Cross-site Scripting (XSS). An attacker with a user-level account can manipulate session cookies to hijack administrator sessions, leading to unauthorized actions and potential system compromise by embedding a malicious markdown image in a chat, which, when viewed by an administrator, sends the admin's session cookie to the attacker's server. How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the How to fix Allocation of Resources Without Limits or Throttling? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Improper Privilege Management through the API endpoint How to fix Improper Privilege Management? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Undefined Behavior for Input to API due to improper access control on the Note: This is only exploitable if the attacker has network access to the application's API. How to fix Undefined Behavior for Input to API? There is no fixed version for | [0,) |
open-webui is an Open WebUI Affected versions of this package are vulnerable to Incorrect Synchronization due to improper access control mechanisms. An attacker can view and delete any files by directly calling specific API endpoints without needing administrative privileges. This is only exploitable if the attacker has access to the network where the application is hosted. How to fix Incorrect Synchronization? There is no fixed version for | [0,) |