Impact
A command injection flaw exists in the install_frontmatter_requirements function of Open WebUI, caused by an insufficiently validated user-supplied string that is used directly in a system call. This weakness enables remote attackers who have authenticated access to the web interface to run arbitrary shell commands in the context of the service account, resulting in full remote code execution and compromising confidentiality, integrity, and availability of the host system.
Affected Systems
The vulnerability affects installations of Open WebUI, specifically version 0.6.32 and potentially earlier releases. Users running this version are at risk until a patch is applied or mitigations are enforced.
Risk and Exploitability
The CVSS score of 8.8 classifies this issue as high severity, while the EPSS score of less than 1% indicates a low but nonzero probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Due to the authentication requirement disclosed in the description, the likely attack vector is an authenticated remote user who can submit crafted data to the install_frontmatter_requirements endpoint. Once injected, the attacker can execute arbitrary commands as the service account, exposing the underlying operating system to compromise.
OpenCVE Enrichment