<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Open-Webui (&lt; 0.6.19) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/open-webui--0.6.19/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 14:26:12 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/open-webui--0.6.19/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open WebUI Inconsistent Authorization Controls in Memories API</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-webui-authz/</link><pubDate>Mon, 11 May 2026 14:26:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-webui-authz/</guid><description>Open WebUI versions before 0.6.19 have inconsistent authorization controls within the memories API, allowing standard users to view, delete, and restore other users' memories, potentially leading to sensitive data disclosure and unauthorized access as tracked by CVE-2026-44570.</description><content:encoded><![CDATA[<p>Open WebUI versions prior to 0.6.19 contain an authorization vulnerability in the memories API that allows a standard, non-admin user to perform unauthorized actions on other users&rsquo; memories. Specifically, a user can view the contents of other users&rsquo; memories via the <code>POST /api/v1/memories/query</code> endpoint, even without having created any memories themselves. Further, the <code>POST /api/v1/memories/{memory_id}/update</code> endpoint leaks memory contents even if modification is not permitted. Additionally, the <code>DELETE /api/v1/memories/{memory_id}</code> endpoint allows any user to delete existing memories, which can then be restored using the update endpoint. This vulnerability, identified as CVE-2026-44570, allows unauthorized access and modification of sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a new, non-admin user account on the Open WebUI instance.</li>
<li>Attacker authenticates to obtain a valid JWT bearer token.</li>
<li>Attacker sends a <code>POST</code> request to <code>/api/v1/memories/query</code> with an empty content payload <code>{&quot;content&quot;: &quot;&quot;}</code> to enumerate existing memories.</li>
<li>The server responds with memory IDs, content snippets and metadata of other users&rsquo; memories.</li>
<li>Attacker can then send a <code>DELETE</code> request to <code>/api/v1/memories/{memory_id}</code> to delete the targeted memory from the application.</li>
<li>Attacker can send a <code>POST</code> request to <code>/api/v1/memories/{memory_id}/update</code> with an empty content payload <code>{&quot;content&quot;: &quot;&quot;}</code> to restore a previously deleted memory.</li>
<li>The attacker has now successfully accessed, deleted, and restored data belonging to other users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44570 can lead to the disclosure of sensitive data stored within user memories. Non-admin users can gain unauthorized access to other users&rsquo; data, delete memories, and restore them. This can impact the confidentiality and integrity of the data managed by Open WebUI. The vulnerability affects Open WebUI instances running versions prior to 0.6.19.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Open WebUI to version 0.6.19 or later to patch CVE-2026-44570.</li>
<li>Monitor web server logs for unauthorized <code>POST</code> requests to <code>/api/v1/memories/query</code> originating from non-admin users, looking for anomalous data access patterns.</li>
<li>Inspect web server logs for unauthorized <code>DELETE</code> requests to <code>/api/v1/memories/{memory_id}</code> originating from non-admin users, and correlate with subsequent <code>POST</code> requests to <code>/api/v1/memories/{memory_id}/update</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthorized Memory Query&rdquo; to identify instances of non-admin users querying the memories API.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization</category><category>information-disclosure</category><category>vulnerability</category></item></channel></rss>