Cyber Posture

CVE-2024-7044

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
29 July 2025
KEV Added
Patch
CVSS Score 8.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
EPSS Score 0.0015 35.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may acquire credentials from web browsers by reading files specific to the target browser.

Security Summary

CVE-2024-7044 is a Stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, in the chat file upload functionality of open-webui/open-webui version 0.3.8. Published on 2025-03-20, it carries a CVSS v3.1 base score of 8.9 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L). The flaw allows an attacker to inject malicious content into an uploaded file, which persists and executes JavaScript when accessed.

An authenticated attacker with low privileges (PR:L) can exploit this by uploading a specially crafted file to the chat interface. When a victim user interacts with the file via a direct URL or shared chat, the injected JavaScript executes in the victim's browser context due to insufficient input sanitization. Successful exploitation enables theft of sensitive user data, session hijacking, malware distribution, and phishing attacks, with high confidentiality and integrity impacts across a changed scope.

Mitigation details and patches are outlined in the primary advisory at https://huntr.com/bounties/c25a885c-d6e2-4169-9ee8-4d33bcbb5ef6. Security practitioners should review this reference for upgrade instructions and workarounds specific to open-webui deployments.

Details

CWE(s)
CWE-79

Affected Products

openwebui
open webui
0.3.8

AI Security Analysis

AI Category
Enterprise AI Assistants
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Open WebUI is a web-based user interface for interacting with LLMs and AI models (e.g., via Ollama or OpenAI-compatible APIs), fitting the Enterprise AI Assistants category. The vulnerability is in its chat file upload feature, part of an AI chat platform, and listed on an AI/ML bug bounty platform.

MITRE ATT&CK Enterprise Techniques

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1555.003 Credentials from Web Browsers Credential Access
Adversaries may acquire credentials from web browsers by reading files specific to the target browser.
Why these techniques?

Stored XSS via malicious file upload enables arbitrary JS execution in victims' browsers upon access via URL/shared chat, facilitating drive-by compromise, public-facing app exploitation, JavaScript execution, browser session hijacking, web session cookie theft, and browser credential theft.

References