{"uuid": "9c6222f7-cb60-4151-8639-b671480f7bb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12537", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10423", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12537\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: In version 0.3.32 of open-webui/open-webui, the absence of authentication mechanisms allows any unauthenticated attacker to access the `api/v1/utils/code/format` endpoint. If a malicious actor sends a POST request with an excessively high volume of content, the server could become completely unresponsive. This could lead to severe performance issues, causing the server to become unresponsive or experience significant degradation, ultimately resulting in service interruptions for legitimate users.\n\ud83d\udccf Published: 2025-03-20T10:09:10.774Z\n\ud83d\udccf Modified: 2025-04-04T08:45:40.046Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/edabd06c-acc0-428c-a481-271f333755bc", "creation_timestamp": "2025-04-04T09:35:54.000000Z"}