Cyber Posture

CVE-2024-7053

CriticalPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0023 46.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries can use stolen session cookies to authenticate to web applications and services.

Security Summary

CVE-2024-7053 is a vulnerability in open-webui/open-webui version 0.3.8 that enables a session fixation attack due to improper session cookie configuration. The session cookie for all users uses the default SameSite=Lax attribute without the Secure flag, permitting it to be transmitted over HTTP to cross-origin domains. This misconfiguration, linked to CWE-79, allows attackers to steal session cookies through crafted content.

An attacker with a user-level account can exploit this by embedding a malicious markdown image in a chat. When an administrator views the chat, the image triggers a request that sends the admin's session cookie to the attacker's server. This enables stealthy takeover of the administrator account, which carries elevated privileges and could lead to remote code execution (RCE). The vulnerability has a CVSS v3.1 score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H), requiring low privileges, network access, and user interaction.

The primary advisory is documented in a Huntr bounty report at https://huntr.com/bounties/947f8191-0abf-4adf-b7c4-d4c19683aba2, which details the issue but does not specify patch availability or mitigation steps in the provided information.

Open WebUI is a web interface for self-hosted large language models, making this vulnerability relevant to AI/ML deployments where administrative access could expose model configurations or enable broader system compromise. No real-world exploitation has been reported as of the CVE publication on 2025-03-20.

Details

CWE(s)
CWE-79

Affected Products

openwebui
open webui
0.3.8

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

Vulnerability enables stealing web session cookies via malicious markdown image (T1539), facilitating privilege escalation from user to admin (T1068) and use of stolen cookie as alternate auth material (T1550.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References