Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Incorrect Authorization vulnerabilities in an interactive lesson.
Start learningUpgrade open-webui to version 0.9.5 or higher.
open-webui is an Open WebUI
Affected versions of this package are vulnerable to Incorrect Authorization through the update_tools_by_id handler in routers/tools.py. An attacker can execute arbitrary Python code on the server by sending a tool update that modifies the tool's content after obtaining a write grant on the tool, even without the workspace permissions normally required to submit executable tool code. The vulnerable path accepts content overwrites for existing tools and passes the updated source into load_tool_module_by_id, where it is imported with exec(content, module.__dict__). In deployments where the worker runs with elevated privileges, this lets a collaborator with only per-tool write access run attacker-controlled code as the server user and potentially exfiltrate data or take over the container.