Impact
An unsanitized filename field in the speech‑to‑text transcription endpoint causes a FileNotFoundError whose message includes the server’s absolute DATA_DIR path. The HTTP 400 response returns this message verbatim, revealing directory structure information to any authenticated non‑admin user. The vulnerability does not allow remote code execution but does enable an attacker to gather internal file system details that could assist further attacks.
Affected Systems
Open WebUI, versions prior to 0.8.6, across all default deployments. The affected component is the /api/v1/audio/transcriptions endpoint in the self‑hosted artificial intelligence platform.
Risk and Exploitability
The CVSS score of 4.3 indicates a moderate impact, and the EPSS score below 1% suggests low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. Attackers need authenticated non‑admin access to trigger the error, so the threat is limited to users who can log in to the application. Nonetheless, disclosure of absolute paths can aid attackers in mapping the system, so the risk is non‑zero for exposed deployments.
OpenCVE Enrichment
Github GHSA