Open WebUI Model Chaining Access Control Bypass
Open WebUI is vulnerable to an access control bypass due to improper model chaining, allowing a regular user to create a model that chains to a restricted base model and query it using the admin's API key, bypassing access restrictions.
Open WebUI, a web interface for Large Language Models, is susceptible to an access control vulnerability via its model chaining feature. This feature allows users to create custom models that reference existing base models for inference. The vulnerability arises because access controls are only applied to the user-facing model, not the chained base model. An attacker with default model creation permissions can exploit this flaw to create a model that chains to a restricted or premium base model, effectively bypassing intended access restrictions and querying the restricted model using the admin-configured API key. This issue affects the current main branch (commit 6fdd19bf1) and likely all versions with the model chaining feature.
Attack Chain
- Admin provisions a restricted model, such as
gpt-4-turbo-restricted, and configures access control policies. - Attacker, without access to the restricted model, crafts a
POSTrequest to/api/v1/models/createwith a payload defining a new model (e.g.,cheap-assistant) and setting itsbase_model_idto the restricted model’s ID. - The
createendpoint lacks validation to ensure the attacker has access to the specifiedbase_model_id. - The attacker now owns the
cheap-assistantmodel, which will pass the initialcheck_model_accesscheck. - The attacker sends a
POSTrequest to/api/chat/completions, specifying the newly createdcheap-assistantmodel. - The application resolves the
base_model_idofcheap-assistanttogpt-4-turbo-restrictedwithinmain.py:1696. - The application rewrites the
payload["model"]to the base model ID, and dispatches the upstream request using the admin-configured API key. - The attacker receives responses from the restricted model, successfully circumventing the intended access restrictions.
Impact
This vulnerability allows unauthorized access to restricted models, potentially leading to increased costs on pay-per-token backends such as OpenAI or Azure, as the admin’s API key is used for unauthorized requests. It also creates a false sense of security, as access restrictions appear to work through the standard model selector but are ineffective against user-created chains. The vulnerability can lead to direct cost impact on pay-per-token backends and erode trust in the configured access controls.
Recommendation
- Deploy the Sigma rule
Detect Open WebUI Model Creation with External BaseModelIDto detect attempts to create models withbase_model_idpointing to existing models, and tune the false positives for your environment. - Deploy the Sigma rule
Detect Open WebUI Chat Completion Request Using Custom Model with BaseModelIDto detect chat completion requests using a custom model with abase_model_idset. - Upgrade to a patched version of Open WebUI that includes proper access control validation for
base_model_idduring model creation to remediate CVE-2026-44555.
Detection coverage 2
Detect Open WebUI Model Creation with External BaseModelID
mediumDetects Open WebUI model creation requests where the `base_model_id` is set, potentially indicating an attempt to exploit the access control bypass vulnerability (CVE-2026-44555).
Detect Open WebUI Chat Completion Request Using Custom Model with BaseModelID
mediumDetects Open WebUI chat completion requests using a custom model, which has a base_model_id set. This could indicate an attempt to exploit the access control bypass vulnerability (CVE-2026-44555).
Detection queries are available on the platform. Get full rules →