Open WebUI LDAP Empty Password Authentication Bypass
Open WebUI is vulnerable to an LDAP authentication bypass where the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against the LDAP server, potentially granting attackers complete account access.
Open WebUI is vulnerable to an LDAP authentication bypass. The LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against the LDAP server. This vulnerability exists because the LdapForm Pydantic model accepts an empty string for the password field without any minimum length constraint. Subsequently, the Connection.bind() call succeeds on vulnerable LDAP servers, and the application issues a full session token for the target user. The issue affects the current main branch (commit 6fdd19bf1) and likely all versions with LDAP authentication support. Exploitation requires that LDAP is enabled and the underlying LDAP server accepts unauthenticated simple binds with empty passwords, which is the default configuration for OpenLDAP and some Active Directory setups.
Attack Chain
- LDAP authentication is enabled on the Open WebUI instance (
ENABLE_LDAP=True). - The attacker identifies a valid LDAP username.
- The underlying LDAP server accepts unauthenticated simple binds (OpenLDAP default, some AD configs).
- Attacker sends a POST request to
/api/v1/auths/ldapwith the target username and an empty password. - The application’s DN bind succeeds, finding the target user via LDAP search.
- The application attempts a user bind using the provided (empty) password.
- The LDAP server returns success for the unauthenticated bind due to the empty password.
authenticate_user_by_emailissues a full session token for the target user, granting complete account access.
Impact
Successful exploitation allows a complete authentication bypass, enabling attackers to take over any LDAP user account without knowing the password, including admin accounts if they authenticate via LDAP. The vulnerability can be exploited with zero interaction from the victim and without rate limiting on the LDAP endpoint.
Recommendation
- Apply the mitigations recommended in GHSA-2r4p-jpmg-48f4 to prevent empty passwords from being used in LDAP authentication.
- Deploy the Sigma rule “Detect Open WebUI LDAP Authentication Bypass Attempt” to monitor for POST requests to the
/api/v1/auths/ldapendpoint with an empty password field, indicating a potential exploit attempt. - Ensure the LDAP server is configured to reject unauthenticated simple binds with empty passwords.
- Monitor web server logs for POST requests to
/api/v1/auths/ldap(webserver log source) and correlate with other authentication-related events.
Detection coverage 2
Detect Open WebUI LDAP Authentication Bypass Attempt
criticalDetects CVE-2026-44551 exploitation — Monitors for POST requests to the `/api/v1/auths/ldap` endpoint with an empty password field, which indicates a potential authentication bypass attempt.
Detect Open WebUI LDAP Authentication Success with Empty Password
criticalDetects CVE-2026-44551 exploitation — Monitors for successful authentication events immediately following a POST request to the `/api/v1/auths/ldap` endpoint where the password was empty, indicating a successful authentication bypass.
Detection queries are available on the platform. Get full rules →