{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T00:43:58.884","vulnerabilities":[{"cve":{"id":"CVE-2024-7043","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:35.727","lastModified":"2025-10-15T13:15:51.457","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An improper access control vulnerability in open-webui/open-webui v0.3.8 allows attackers to view and delete any files. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the GET /api/v1/files/ interface to retrieve information on all files uploaded by users, which includes the ID values. The attacker can then use the GET /api/v1/files/{file_id} interface to obtain information on any file and the DELETE /api/v1/files/{file_id} interface to delete any file."},{"lang":"es","value":"Una vulnerabilidad de control de acceso indebido en open-webui/open-webui v0.3.8 permite a los atacantes ver y eliminar cualquier archivo. La aplicación no verifica si el atacante es administrador, lo que le permite llamar directamente a la interfaz GET /api/v1/files/ para obtener información sobre todos los archivos subidos por los usuarios, incluyendo los valores de ID. El atacante puede usar la interfaz GET /api/v1/files/{file_id} para obtener información sobre cualquier archivo y la interfaz DELETE /api/v1/files/{file_id} para eliminar cualquier archivo."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*","matchCriteriaId":"7BFA5C2D-BD4F-4BD5-8D4E-D3BE4036FFA4"}]}]}],"references":[{"url":"https://huntr.com/bounties/c01e0c7f-68d8-45cf-91d2-521c97f33b00","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}