<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T21:16:42.049170+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/77e9b052-62dc-473a-937a-da9fa20c6197/export</id>
    <title>77e9b052-62dc-473a-937a-da9fa20c6197</title>
    <updated>2026-05-04T21:16:42.348438+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "77e9b052-62dc-473a-937a-da9fa20c6197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7048", "type": "seen", "source": "https://t.me/cvedetector/7542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7048 - Apache Open-WebUI Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7048 \nPublished : Oct. 10, 2024, 2:15 a.m. | 33\u00a0minutes ago \nDescription : In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-10T05:02:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/77e9b052-62dc-473a-937a-da9fa20c6197/export"/>
    <published>2024-10-10T05:02:24+00:00</published>
  </entry>
</feed>
