Impact
Open WebUI’s image uploading feature suffered an application‑wide CSRF vulnerability before version 0.9.3. An attacker can set an image URL to a malicious endpoint, allowing any authenticated user to perform actions on behalf of a victim when the image is loaded, and any user who views that image will unknowingly send a GET request to the attacker‑controlled URL. This flaw can lead to cookie theft, denial of service, or other malicious actions on the victim’s account. The weakness involves improper input validation and failure to require a CSRF token, identified as CWE‑20 and CWE‑352. This vulnerability was fixed in 0.9.3.
Affected Systems
Affected systems include the open‑webui application before version 0.9.3
Risk and Exploitability
The CVSS base score is 4.6, indicating a moderate impact. EPSS is not available, and the vulnerability is not listed in KEV. Because any authenticated user can supply an image URL and any viewer of that image triggers a GET request to the attacker‑controlled endpoint, the attack surface is wide. The primary attack vector is remote via the web interface, requiring only that the target user is authenticated and views the malicious image. The vulnerability is exploitable without privileges beyond those held by a regular user.
OpenCVE Enrichment
Github GHSA