<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Open-Webui (&lt;= 0.6.18) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/open-webui--0.6.18/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 14:08:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/open-webui--0.6.18/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open WebUI Insecure Direct Object Reference in Channel Messages</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-webui-idor/</link><pubDate>Mon, 11 May 2026 14:08:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-webui-idor/</guid><description>Open WebUI versions 0.6.18 and earlier are vulnerable to an insecure direct object reference (IDOR) in the channels message management system; authenticated users with read access to a channel can modify or delete any message within that channel due to missing message ownership validation in the message update and delete endpoints.</description><content:encoded><![CDATA[<p>Open WebUI versions 0.6.18 and earlier contain an Insecure Direct Object Reference (IDOR) vulnerability within the channel message management system. This flaw allows authenticated users with read access to a channel to modify or delete messages created by other users within the same channel. The vulnerability stems from the absence of message ownership validation in the backend API endpoints responsible for updating and deleting messages. While the frontend implements client-side checks to restrict message editing and deletion to owners or administrators, these controls can be bypassed by directly interacting with the backend APIs, allowing unauthorized message tampering and deletion. This poses a risk to message integrity and auditability within collaborative channel environments. The issue was reported on May 11, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Open WebUI application.</li>
<li>Attacker gains read access to a channel.</li>
<li>Victim creates a message within the channel.</li>
<li>Attacker observes the <code>message_id</code> of the victim&rsquo;s message, either through the frontend or by intercepting API requests.</li>
<li>Attacker crafts a malicious API request to either update the message content or delete the message, using the victim&rsquo;s <code>message_id</code> and the channel&rsquo;s ID.</li>
<li>Attacker sends the crafted API request to the <code>/api/v1/channels/{channel_id}/messages/{victim_message_id}/update</code> or <code>/api/v1/channels/{channel_id}/messages/{victim_message_id}/delete</code> endpoint, bypassing frontend controls.</li>
<li>The backend API validates the attacker&rsquo;s channel access (read permission) but fails to verify message ownership.</li>
<li>The victim&rsquo;s message is modified or deleted, leading to data manipulation or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this IDOR vulnerability enables unauthorized modification and deletion of messages within Open WebUI channels. Users with only read access can gain write/delete capabilities over other users&rsquo; content, potentially leading to the alteration of critical information, disruption of communication, and undermining the integrity of audit trails. This vulnerability affects Open WebUI instances with channels enabled, potentially impacting any collaborative environments relying on message integrity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Open WebUI Message Modification via IDOR&rdquo; to identify potential exploitation attempts by monitoring POST requests to the message update endpoint (<code>/api/v1/channels/{channel_id}/messages/{victim_message_id}/update</code>) and DELETE requests to the message delete endpoint (<code>/api/v1/channels/{channel_id}/messages/{victim_message_id}/delete</code>) in the <code>webserver</code> logs.</li>
<li>Apply the remediation steps recommended by the vendor, which includes implementing proper message ownership validation in the update and delete endpoints to prevent unauthorized message modification and deletion.</li>
<li>Upgrade Open WebUI to a version later than 0.6.18 to patch CVE-2026-44569.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>privilege-escalation</category><category>defense-evasion</category><category>cloud</category></item></channel></rss>