{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T21:17:45.730","vulnerabilities":[{"cve":{"id":"CVE-2024-7035","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:35.247","lastModified":"2025-07-29T18:06:09.437","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In version v0.3.8 of open-webui/open-webui, sensitive actions such as deleting and resetting are performed using the GET method. This vulnerability allows an attacker to perform Cross-Site Request Forgery (CSRF) attacks, where an unaware user can unintentionally perform sensitive actions by simply visiting a malicious site or through top-level navigation. The affected endpoints include /rag/api/v1/reset, /rag/api/v1/reset/db, /api/v1/memories/reset, and /rag/api/v1/reset/uploads. This impacts both the availability and integrity of the application."},{"lang":"es","value":"En la versión v0.3.8 de open-webui/open-webui, acciones sensibles como eliminar y restablecer se realizan mediante el método GET. Esta vulnerabilidad permite a un atacante realizar ataques de Cross-Site Request Forgery (CSRF), donde un usuario desprevenido puede realizar acciones sensibles sin querer simplemente visitando un sitio malicioso o a través de la navegación de nivel superior. Los endpoints afectados incluyen /rag/api/v1/reset, /rag/api/v1/reset/db, /api/v1/memories/reset y /rag/api/v1/reset/uploads. Esto afecta tanto la disponibilidad como la integridad de la aplicación."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:L","baseScore":6.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.7,"impactScore":4.7}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*","matchCriteriaId":"7BFA5C2D-BD4F-4BD5-8D4E-D3BE4036FFA4"}]}]}],"references":[{"url":"https://huntr.com/bounties/2ac81740-410b-467a-9244-75d82a6f9e11","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}