{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T19:47:52.211","vulnerabilities":[{"cve":{"id":"CVE-2024-12537","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:29.140","lastModified":"2025-04-04T09:15:15.947","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unresponsive. This could lead to severe performance issues, causing the server to become unresponsive or experience significant degradation, ultimately resulting in service interruptions for legitimate users."},{"lang":"es","value":"En la versión 0.3.32 de open-webui/open-webui, la ausencia de mecanismos de autenticación permite a cualquier atacante no autenticado acceder al endpoint `api/v1/utils/code/format`. Si un atacante envía una solicitud POST con un volumen excesivo de contenido, el servidor podría dejar de responder por completo. Esto podría provocar graves problemas de rendimiento, provocando que el servidor deje de responder o experimente una degradación significativa, lo que a su vez provocaría interrupciones del servicio para los usuarios legítimos."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openwebui:open_webui:0.3.32:*:*:*:*:*:*:*","matchCriteriaId":"9D070B86-0839-459E-9C0F-D8F945F82337"}]}]}],"references":[{"url":"https://huntr.com/bounties/edabd06c-acc0-428c-a481-271f333755bc","source":"security@huntr.dev","tags":["Exploit"]},{"url":"https://huntr.com/bounties/edabd06c-acc0-428c-a481-271f333755bc","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit"]}]}}]}