In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unresponsive. This could lead to severe performance issues, causing the server to become unresponsive or experience significant degradation, ultimately resulting in service interruptions for legitimate users.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unresponsive. This could lead to severe performance issues, causing the server to become unresponsive or experience significant degradation, ultimately resulting in service interruptions for legitimate users. | |
Title | Unauthenticated Denial of Service in open-webui/open-webui | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:09:10.774Z
Updated: 2025-03-20T14:28:57.671Z
Reserved: 2024-12-11T18:20:07.207Z
Link: CVE-2024-12537

Updated: 2025-03-20T14:28:46.332Z

Status : Awaiting Analysis
Published: 2025-03-20T10:15:29.140
Modified: 2025-03-20T15:15:40.673
Link: CVE-2024-12537

No data.