Open WebUI Chat Completion API Tool Restriction Bypass (CVE-2026-45350)
Open WebUI versions prior to 0.8.6 contain a vulnerability in the chat completion API that allows attackers to bypass tool restrictions by invoking any server tool with elevated privileges by supplying the correct tool_id or tool_servers parameters; this issue is tracked as CVE-2026-45350.
Open WebUI is vulnerable to a tool restriction bypass in its chat completion API. Specifically, versions 0.6.43 through 0.8.5 are affected. The vulnerability, identified as CVE-2026-45350, stems from a lack of proper permission checks when retrieving tools via the get_tool_by_id function. An attacker can exploit this by supplying arbitrary tool_id or tool_servers parameters through the chat completion API, thereby invoking restricted server tools with elevated privileges. This occurs because the authentication token stored on the server is used when invoking the tool, effectively granting the attacker server-level privileges. The issue was resolved in versions v0.7.0 and v0.8.6.
Attack Chain
- An attacker with low privileges gains access to an Open WebUI instance.
- The attacker identifies a restricted tool configured within the Open WebUI instance.
- The attacker crafts a malicious request to the
/api/chat/completionsendpoint. - The request includes a prompt designed to utilize the restricted tool.
- The request contains the
tool_idsparameter set to the ID of the restricted tool, or thetool_serversparameter, pointing to the restricted tool’s server. - The
get_tool_by_idfunction retrieves the tool without proper permission checks. - The server’s authentication token is used to invoke the tool.
- The restricted tool executes with server privileges, potentially leading to unauthorized actions.
Impact
Successful exploitation of this vulnerability allows low-privilege users to bypass intended tool restrictions and execute privileged actions within the Open WebUI environment. This can lead to unauthorized data access, modification, or other malicious activities, effectively escalating the attacker’s privileges and compromising the integrity of the system.
Recommendation
- Upgrade Open WebUI to version 0.8.6 or later to remediate CVE-2026-45350.
- Deploy the provided Sigma rule
Detect Open WebUI Chat Completion API Tool Restriction Bypassto identify attempts to exploit this vulnerability via HTTP requests to the/api/chat/completionsendpoint. - Monitor web server logs for suspicious requests containing
tool_idsparameters associated with restricted tools to detect potential exploitation attempts. - Review and enforce proper access controls for tools within Open WebUI to prevent unauthorized usage, in addition to patching.
Detection coverage 2
Detect Open WebUI Chat Completion API Tool Restriction Bypass
highDetects CVE-2026-45350 exploitation — Attempts to invoke the /api/chat/completions endpoint with tool_ids parameter indicating potential tool restriction bypass
Detect Open WebUI MCP Streamable HTTP Tool Configuration
lowDetects creation of MCP Streamable HTTP external tools which can lead to malicious code execution
Detection queries are available on the platform. Get full rules →