CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-8026

Description: A Cross-Site Request Forgery (CSRF) vulnerability exists in the backend API of netease-youdao/qanything, as of commit d9ab8bc. The backend server has overly permissive CORS headers, allowing all cross-origin calls. This vulnerability affects all backend endpoints, enabling actions such as creating, uploading, listing, deleting files, and managing knowledge bases.

CVSS: HIGH (8.1)

EPSS Score: 0.02%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-8024

Description: A CORS misconfiguration vulnerability exists in netease-youdao/qanything version 1.4.1. This vulnerability allows an attacker to bypass the Same-Origin Policy, potentially leading to sensitive information exposure. Properly implementing a restrictive CORS policy is crucial to prevent such security issues.

CVSS: HIGH (7.5)

EPSS Score: 0.02%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-8020

Description: A vulnerability in lightning-ai/pytorch-lightning version 2.3.2 allows an attacker to cause a denial of service by sending an unexpected POST request to the `/api/v1/state` endpoint of `LightningApp`. This issue occurs due to improper handling of unexpected state values, which results in the server shutting down.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-8018

Description: A vulnerability in imartinez/privategpt version 0.5.0 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process these characters, rendering privateGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-7990

Description: A stored cross-site scripting (XSS) vulnerability exists in open-webui/open-webui version 0.3.8. The vulnerability is present in the `/api/v1/models/add` endpoint, where the model description field is improperly sanitized before being rendered in chat. This allows an attacker to inject malicious scripts that can be executed by any user, including administrators, potentially leading to arbitrary code execution.

CVSS: HIGH (8.4)

EPSS Score: 0.05%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-7983

Description: In version 0.3.8 of open-webui, an endpoint for converting markdown to HTML is exposed without authentication. A maliciously crafted markdown payload can cause the server to spend excessive time converting it, leading to a denial of service. The server becomes unresponsive to other requests until the conversion is complete.

CVSS: HIGH (7.5)

EPSS Score: 0.09%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-7959

Description: The `/openai/models` endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and return the output. This vulnerability allows the attacker to access internal services and potentially gain command execution by accessing instance secrets.

CVSS: HIGH (7.7)

EPSS Score: 0.04%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-7819

Description: A CORS misconfiguration in danswer-ai/danswer v1.4.1 allows attackers to steal sensitive information such as chat contents, API keys, and other data. This vulnerability occurs due to improper validation of the origin header, enabling malicious web pages to make unauthorized requests to the application's API.

CVSS: HIGH (7.4)

EPSS Score: 0.02%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-7806

Description: A vulnerability in open-webui/open-webui versions <= 0.3.8 allows remote code execution by non-admin users via Cross-Site Request Forgery (CSRF). The application uses cookies with the SameSite attribute set to lax for authentication and lacks CSRF tokens. This allows an attacker to craft a malicious HTML that, when accessed by a victim, can modify the Python code of an existing pipeline and execute arbitrary code with the victim's privileges.

CVSS: HIGH (8.0)

EPSS Score: 0.09%

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-7779

Description: A vulnerability in danswer-ai/danswer version 1 allows an attacker to perform a Regular Expression Denial of Service (ReDoS) by manipulating regular expressions. This can significantly slow down the application's response time and potentially render it completely unusable.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
March 20th, 2025 (4 months ago)