Impact
The vulnerability arises from Open WebUI accepting uploaded files without validating the file name, allowing dot‑segments to designate out‑of‑directory paths. This permits attackers to write files anywhere the web‑server process can access, effectively overwriting critical configuration files or placing executable code. It is a combination of a path‑traversal flaw (CWE‑22) and unchecked file‑upload (CWE‑434), enabling significant compromise of confidentiality, integrity, and potentially availability.
Affected Systems
Installations of the Open WebUI platform from the open‑webui:open-webui product line that are running a version older than 0.1.124 remain affected. The flaw was fixed in release 0.1.124, so any deployment that has not yet upgraded continues to be vulnerable and should be verified against the latest release notes.
Risk and Exploitability
The CVSS score of 7.3 indicates high severity. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been widely exploited. However, because the flaw is reachable through the public web interface, anyone capable of accessing the UI can trigger it, giving attackers broad opportunities to alter system configuration or introduce malicious code. The potential for wide impact makes the risk significant for exposed or publicly reachable deployments.
OpenCVE Enrichment
Github GHSA