Impact
Open WebUI contains a flaw in its SVG rendering engine that allows a malicious SVG file to be stored and later displayed to users. When an SVG containing embedded script is rendered, the script runs in the victim’s browser context. This can enable an attacker to execute arbitrary client‑side code against users who view the SVG. The weakness arises from a lack of proper input validation and output encoding, as identified by CWE‑80.
Affected Systems
All instances of the open‑webui application with a version earlier than 0.6.31. Administrators should confirm the installed version if the vulnerability may be present.
Risk and Exploitability
The CVSS score of 5.1 denotes medium severity. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires an attacker to supply a malicious SVG, potentially via an upload or other input mechanism. Once the malicious SVG is rendered, the injected script executes within the context of legitimate users who view it, making the issue exploitable in shared or public deployments. Based on the available information, the risk is moderate, and timely remediation is advisable.
OpenCVE Enrichment
Github GHSA