Impact
The flaw exists in the load_tool_module_by_id function of Open WebUI. A lack of proper validation on a user‑supplied string allows execution of arbitrary Python code. Attackers can trigger remote code execution on the service account, leading to full compromise of the affected system.
Affected Systems
Open WebUI version 0.6.32 installations are affected. The vulnerability is tied to the load_tool_module_by_id endpoint in this product; no other version information was provided.
Risk and Exploitability
The CVSS score of 8.8 classifies this as high severity. The EPSS score below 1% indicates a low probability of exploitation at this time, and it is not listed in the KEV catalog. Because authentication is required, an attacker must possess valid credentials or have compromised an account. Once authenticated, a crafted malicious string can be passed to the function, which executes it as Python code, giving the attacker full control of the service.
OpenCVE Enrichment