CVE-2024-7044
Published: 20 March 2025
Description
Adversaries may acquire credentials from web browsers by reading files specific to the target browser.
Security Summary
CVE-2024-7044 is a Stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, in the chat file upload functionality of open-webui/open-webui version 0.3.8. Published on 2025-03-20, it carries a CVSS v3.1 base score of 8.9 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L). The flaw allows an attacker to inject malicious content into an uploaded file, which persists and executes JavaScript when accessed.
An authenticated attacker with low privileges (PR:L) can exploit this by uploading a specially crafted file to the chat interface. When a victim user interacts with the file via a direct URL or shared chat, the injected JavaScript executes in the victim's browser context due to insufficient input sanitization. Successful exploitation enables theft of sensitive user data, session hijacking, malware distribution, and phishing attacks, with high confidentiality and integrity impacts across a changed scope.
Mitigation details and patches are outlined in the primary advisory at https://huntr.com/bounties/c25a885c-d6e2-4169-9ee8-4d33bcbb5ef6. Security practitioners should review this reference for upgrade instructions and workarounds specific to open-webui deployments.
Details
- CWE(s)
Affected Products
AI Security Analysis
- AI Category
- Enterprise AI Assistants
- Risk Domain
- Other ATLAS/OWASP Terms
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Open WebUI is a web-based user interface for interacting with LLMs and AI models (e.g., via Ollama or OpenAI-compatible APIs), fitting the Enterprise AI Assistants category. The vulnerability is in its chat file upload feature, part of an AI chat platform, and listed on an AI/ML bug bounty platform.
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Stored XSS via malicious file upload enables arbitrary JS execution in victims' browsers upon access via URL/shared chat, facilitating drive-by compromise, public-facing app exploitation, JavaScript execution, browser session hijacking, web session cookie theft, and browser credential theft.