Cyber Posture

CVE-2024-7034

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
29 July 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0673 91.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may modify host software binaries to establish persistent access to systems.

Security Summary

CVE-2024-7034 is a directory traversal vulnerability (CWE-22) in open-webui version 0.3.8 that enables arbitrary file writes. The issue affects the `/models/upload` endpoint, where user-supplied filenames are not validated or sanitized before use in path construction. Specifically, the code sets `file_path = f"{UPLOAD_DIR}/{file.filename}"`, allowing attackers to manipulate the `file.filename` parameter with traversal sequences to escape the intended upload directory.

Attackers require network access and high privileges (PR:H per CVSS v3.1 score of 7.2: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) to exploit this unauthenticated endpoint. By crafting a malicious filename, such as one containing `../` sequences, they can overwrite arbitrary files outside `UPLOAD_DIR`, including system binaries, configuration files, or sensitive data. This could enable unauthorized modifications and potentially lead to remote command execution.

Mitigation details are available in the Huntr advisory at https://huntr.com/bounties/711beada-10fe-4567-9278-80a689da8613, published on 2025-03-20.

Details

CWE(s)
CWE-22

Affected Products

openwebui
open webui
0.3.8

AI Security Analysis

AI Category
Enterprise AI Assistants
Risk Domain
Supply Chain and Deployment
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Open WebUI is a self-hosted web interface for managing and interacting with large language models (LLMs), functioning as an AI assistant platform. The vulnerability is in the `/models/upload` endpoint, directly related to AI model handling.

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1554 Compromise Host Software Binary Persistence
Adversaries may modify host software binaries to establish persistent access to systems.
Why these techniques?

Directory traversal in /models/upload enables exploitation of public-facing web application (T1190) for arbitrary file writes, allowing overwrite of system binaries and configs to compromise host software (T1554), potentially leading to RCE.

References