Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5jp3-wp5v-5363 | Open WebUI Stored Cross-Site Scripting Vulnerability |
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 08 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 08 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux Openwebui Openwebui open Webui |
|
| CPEs | cpe:2.3:a:openwebui:open_webui:0.1.105:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Debian
Debian debian Linux Openwebui Openwebui open Webui |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 08 Aug 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 08 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 07 Aug 2024 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Attackers can craft a malicious prompt that coerces the language model into executing arbitrary JavaScript in the context of the web page. | |
| Title | Open WebUI Stored Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
|
Status: PUBLISHED
Assigner: KoreLogic
Published:
Updated: 2024-08-08T15:02:48.839Z
Reserved: 2024-07-11T21:30:45.204Z
Link: CVE-2024-6706
Updated: 2024-08-08T13:17:51.892Z
Status : Modified
Published: 2024-08-07T23:15:41.350
Modified: 2024-11-21T09:50:09.480
Link: CVE-2024-6706
No data.
OpenCVE Enrichment
No data.
Github GHSA