{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T04:06:14.654","vulnerabilities":[{"cve":{"id":"CVE-2024-7990","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:38.503","lastModified":"2025-07-21T20:07:26.380","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A stored cross-site scripting (XSS) vulnerability exists in open-webui/open-webui version 0.3.8. The vulnerability is present in the `/api/v1/models/add` endpoint, where the model description field is improperly sanitized before being rendered in chat. This allows an attacker to inject malicious scripts that can be executed by any user, including administrators, potentially leading to arbitrary code execution."},{"lang":"es","value":"Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en open-webui/open-webui versión 0.3.8. La vulnerabilidad está presente en el endpoint `/api/v1/models/add`, donde el campo de descripción del modelo se depura incorrectamente antes de mostrarse en el chat. Esto permite a un atacante inyectar scripts maliciosos que cualquier usuario, incluidos los administradores, puede ejecutar, lo que podría provocar la ejecución de código arbitrario."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.7,"impactScore":6.0}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openwebui:open_webui:0.3.8:*:*:*:*:*:*:*","matchCriteriaId":"7BFA5C2D-BD4F-4BD5-8D4E-D3BE4036FFA4"}]}]}],"references":[{"url":"https://huntr.com/bounties/2256e336-0f67-449e-a82d-7fc57081a21c","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}