Skip to content
Threat Feed
high advisory

Open WebUI Model Chaining Access Control Bypass

Open WebUI is vulnerable to an access control bypass due to improper model chaining, allowing a regular user to create a model that chains to a restricted base model and query it using the admin's API key, bypassing access restrictions.

Open WebUI, a web interface for Large Language Models, is susceptible to an access control vulnerability via its model chaining feature. This feature allows users to create custom models that reference existing base models for inference. The vulnerability arises because access controls are only applied to the user-facing model, not the chained base model. An attacker with default model creation permissions can exploit this flaw to create a model that chains to a restricted or premium base model, effectively bypassing intended access restrictions and querying the restricted model using the admin-configured API key. This issue affects the current main branch (commit 6fdd19bf1) and likely all versions with the model chaining feature.

Attack Chain

  1. Admin provisions a restricted model, such as gpt-4-turbo-restricted, and configures access control policies.
  2. Attacker, without access to the restricted model, crafts a POST request to /api/v1/models/create with a payload defining a new model (e.g., cheap-assistant) and setting its base_model_id to the restricted model’s ID.
  3. The create endpoint lacks validation to ensure the attacker has access to the specified base_model_id.
  4. The attacker now owns the cheap-assistant model, which will pass the initial check_model_access check.
  5. The attacker sends a POST request to /api/chat/completions, specifying the newly created cheap-assistant model.
  6. The application resolves the base_model_id of cheap-assistant to gpt-4-turbo-restricted within main.py:1696.
  7. The application rewrites the payload["model"] to the base model ID, and dispatches the upstream request using the admin-configured API key.
  8. The attacker receives responses from the restricted model, successfully circumventing the intended access restrictions.

Impact

This vulnerability allows unauthorized access to restricted models, potentially leading to increased costs on pay-per-token backends such as OpenAI or Azure, as the admin’s API key is used for unauthorized requests. It also creates a false sense of security, as access restrictions appear to work through the standard model selector but are ineffective against user-created chains. The vulnerability can lead to direct cost impact on pay-per-token backends and erode trust in the configured access controls.

Recommendation

  • Deploy the Sigma rule Detect Open WebUI Model Creation with External BaseModelID to detect attempts to create models with base_model_id pointing to existing models, and tune the false positives for your environment.
  • Deploy the Sigma rule Detect Open WebUI Chat Completion Request Using Custom Model with BaseModelID to detect chat completion requests using a custom model with a base_model_id set.
  • Upgrade to a patched version of Open WebUI that includes proper access control validation for base_model_id during model creation to remediate CVE-2026-44555.

Detection coverage 2

Detect Open WebUI Model Creation with External BaseModelID

medium

Detects Open WebUI model creation requests where the `base_model_id` is set, potentially indicating an attempt to exploit the access control bypass vulnerability (CVE-2026-44555).

sigma tactics: defense_evasion, privilege_escalation techniques: T1555 sources: webserver

Detect Open WebUI Chat Completion Request Using Custom Model with BaseModelID

medium

Detects Open WebUI chat completion requests using a custom model, which has a base_model_id set. This could indicate an attempt to exploit the access control bypass vulnerability (CVE-2026-44555).

sigma tactics: defense_evasion, privilege_escalation techniques: T1555 sources: webserver

Detection queries are available on the platform. Get full rules →