Open WebUI SSRF Vulnerability via URL Parsing Discrepancy (CVE-2026-45400)
Open WebUI versions 0.9.4 and earlier are vulnerable to Server-Side Request Forgery (SSRF) due to a parsing difference between the urlparse and requests libraries in the `validate_url` function, allowing attackers to bypass URL validation and make requests to internal IP addresses.
Open WebUI versions 0.9.4 and earlier contain a server-side request forgery (SSRF) vulnerability (CVE-2026-45400) in the validate_url function. The vulnerability arises from inconsistent URL parsing between the urlparse and requests libraries. Specifically, urlparse may interpret a URL like http://127.0.0.1:6666\@1.1.1.1 as pointing to the public IP address 1.1.1.1, while the requests library interprets it as the internal IP address 127.0.0.1:6666. This discrepancy allows an attacker to bypass the intended URL validation and make unauthorized requests to internal resources. Successful exploitation can lead to information disclosure or further internal network compromise. The vulnerability was reported on May 14, 2026.
Attack Chain
- The attacker crafts a malicious URL with the format
http://127.0.0.1:6666\@public.ip.address. - The user provides the crafted URL to Open WebUI, which uses the
validate_urlfunction to validate the URL. - The
validate_urlfunction usesurllib.parse.urlparseto parse the hostname of the URL. urllib.parse.urlparseincorrectly identifies the hostname aspublic.ip.addressdue to the presence of the@symbol after the internal IP address.- The validation logic considers
public.ip.addressas a public IP and approves the URL. - The application then uses the
requests.getfunction to make a request to the validated URL. requests.getinterprets the URL differently and sends the request to the internal IP address127.0.0.1:6666.- The attacker successfully makes a request to the internal IP address, achieving SSRF and potentially gaining access to sensitive information or internal services.
Impact
Successful exploitation of this SSRF vulnerability (CVE-2026-45400) in Open WebUI can allow an attacker to bypass URL validation and make unauthorized requests to internal resources. This may lead to information disclosure, access to internal services, or further compromise of the internal network. The severity is rated as high due to the potential for significant impact on confidentiality and integrity. Affected organizations may experience data breaches or service disruptions.
Recommendation
- Upgrade to a patched version of Open WebUI that addresses the URL parsing discrepancy.
- Deploy the Sigma rule
Detect Open WebUI SSRF Attempt via Malicious URLto detect attempts to exploit this vulnerability. - Review and harden URL validation logic within the Open WebUI application to ensure consistent parsing across different libraries.
- Implement network segmentation and access controls to limit the impact of potential SSRF vulnerabilities.
Detection coverage 2
Detect Open WebUI SSRF Attempt via Malicious URL
highDetects CVE-2026-45400 exploitation — Attempts to exploit the Open WebUI SSRF vulnerability by detecting URLs with embedded IP addresses and @ symbols
Detect Requests to Private IP Addresses
mediumDetects requests originating from the server to RFC1918 private IP addresses
Detection queries are available on the platform. Get full rules →