{ "schema_version": "1.4.0", "id": "GHSA-43g4-487m-5q6m", "modified": "2025-03-21T17:30:58Z", "published": "2025-03-20T12:32:46Z", "aliases": [ "CVE-2024-7053" ], "summary": "Open WebUI Vulnerable to a Session Fixation Attack", "details": "A vulnerability in open-webui/open-webui version 0.3.8 allows an attacker with a user-level account to perform a session fixation attack. The session cookie for all users is set with the default `SameSite=Lax` and does not have the `Secure` flag enabled, allowing the session cookie to be sent over HTTP to a cross-origin domain. An attacker can exploit this by embedding a malicious markdown image in a chat, which, when viewed by an administrator, sends the admin's session cookie to the attacker's server. This can lead to a stealthy administrator account takeover, potentially resulting in remote code execution (RCE) due to the elevated privileges of administrator accounts.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N" } ], "affected": [ { "package": { "ecosystem": "PyPI", "name": "open-webui" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "last_affected": "0.3.8" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7053" }, { "type": "PACKAGE", "url": "https://github.com/open-webui/open-webui" }, { "type": "WEB", "url": "https://huntr.com/bounties/947f8191-0abf-4adf-b7c4-d4c19683aba2" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-03-21T17:30:58Z", "nvd_published_at": "2025-03-20T10:15:36Z" } }