Security researchers have publicly disclosed a severe stored Cross-Site Scripting (XSS) flaw that enables 1-click Remote Code Execution (RCE) and full account hijacking with no patch currently available.
The security flaw resides in the profile image upload feature of Open WebUI, specifically within its backend routing architecture.
Security researcher Metin Yunus Kandemir discovered that the application fails to properly validate media types when handling base64-encoded profile pictures.
An attacker can upload malicious JavaScript code using the data:image/svg+xml;base64 syntax, and when the server processes the upload, it decodes and returns the image data directly to the browser as a streaming response.
Because the system lacks a strict allowlist of safe image formats like JPEG or PNG, it blindly processes SVG files containing embedded malicious scripts.
Rather than forcing the file to download, the application renders it inline, causing the browser to execute the hidden code immediately.
Exploiting this vulnerability requires minimal user interaction, making it especially dangerous in enterprise environments.
The attack chain unfolds in a few precise steps:
The attack specifically targets these API endpoints:
| Target Endpoint | Attack Function |
|---|---|
/api/v1/tools/create | Remote Code Execution payload delivery |
/api/v1/chats/all | Chat history extraction for account takeover |
/api/v1/users/search | Target identification and enumeration |
/api/v1/users/[user_id]/profile/image | Malicious SVG payload execution |
The path to disclosure has been fraught with tension. Researchers originally reported the issue privately to Open WebUI maintainers in March, but developers closed the report two months later as a duplicate of a non-public advisory and refused to grant official acknowledgment.
Believing this response violated responsible disclosure norms, researchers published the technical details publicly to warn the community.
The vulnerability remains entirely unpatched in version 0.7.2. Until an official fix is released, users and administrators should take these immediate steps:
users.py code by restricting the media_type variable to a strict allowlist of safe formats such as JPEG and PNGFollow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Open WebUI File Upload Vulnerability Enables One-Click RCE Attacks appeared first on Cyber Security News.
UK politicians have strongly criticized GTA 6 developer Rockstar for its firing of 34 workers…
May is quite a big month for LEGO fans. Not only are there a wide…
Christopher Nolan has defended his upcoming movie, The Odyssey, from complaints about historical accuracy, after…
If you’re looking for recently released games to play on Switch, both Metroid Prime 4:…
Marvel fans are still puzzling over the decision to wrap up the wildly successful Ultimate…
Pokémon fans, it's time to clear out some space on your bookshelf, as the shiny…
This website uses cookies.