Skip to content
Threat Feed

Product

Open-Webui (<= 0.8.12)

6 briefs RSS
high advisory

Open WebUI /responses Endpoint Authentication Bypass Vulnerability

The /responses endpoint in Open WebUI's OpenAI router lacks access control, allowing authenticated users to bypass per-model access controls and interact with any configured model, potentially leading to denial of service, model theft, and access policy bypass.

open-webui authentication-bypass llm owasp
2r
critical advisory

Open WebUI LDAP Empty Password Authentication Bypass

Open WebUI is vulnerable to an LDAP authentication bypass where the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against the LDAP server, potentially granting attackers complete account access.

open-webui authentication-bypass ldap
2r 1t
high advisory

Open WebUI Cross-Instance Cache Poisoning Vulnerability

Open WebUI versions up to 0.8.12 are vulnerable to cross-instance cache poisoning when multiple instances share a Redis backend, allowing an attacker with admin access on one instance to overwrite cache values used by other instances, leading to data exfiltration and prompt injection attacks.

open-webui +1 cache-poisoning redis vulnerability
2r 2t
high advisory

Open WebUI Stale Admin Role Enables Post-Demotion Cross-User Note Access

Open WebUI is vulnerable to privilege escalation; when a user connects via Socket.IO, their role is stored in an in-memory session pool, and administrative changes do not invalidate this session, allowing unauthorized access and modification of other users' notes after role revocation.

open-webui privilege-escalation credential-access cloud
2r 1t
high advisory

Open WebUI Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overwrite

Open WebUI is vulnerable to knowledge base destruction and RAG poisoning due to a lack of authorization checks on the `/api/v1/retrieval/process/web` endpoint, allowing an attacker to overwrite a victim's knowledge base with attacker-controlled content.

open-webui rag poisoning web-application
2r 1t 1i
high advisory

Open WebUI Model Chaining Access Control Bypass

Open WebUI is vulnerable to an access control bypass due to improper model chaining, allowing a regular user to create a model that chains to a restricted base model and query it using the admin's API key, bypassing access restrictions.

open-webui access-control model-chaining privilege-escalation
2r 2t