<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 08:57:57 +0000</lastBuildDate>
    <item>
      <title>77e9b052-62dc-473a-937a-da9fa20c6197</title>
      <link>https://vulnerability.circl.lu/sighting/77e9b052-62dc-473a-937a-da9fa20c6197/export</link>
      <description>{"uuid": "77e9b052-62dc-473a-937a-da9fa20c6197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7048", "type": "seen", "source": "https://t.me/cvedetector/7542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7048 - Apache Open-WebUI Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7048 \nPublished : Oct. 10, 2024, 2:15 a.m. | 33\u00a0minutes ago \nDescription : In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-10T05:02:24.000000Z"}</description>
      <content:encoded>{"uuid": "77e9b052-62dc-473a-937a-da9fa20c6197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7048", "type": "seen", "source": "https://t.me/cvedetector/7542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7048 - Apache Open-WebUI Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7048 \nPublished : Oct. 10, 2024, 2:15 a.m. | 33\u00a0minutes ago \nDescription : In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-10T05:02:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/77e9b052-62dc-473a-937a-da9fa20c6197/export</guid>
      <pubDate>Thu, 10 Oct 2024 05:02:24 +0000</pubDate>
    </item>
  </channel>
</rss>
