<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Authorization_bypass — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/authorization_bypass/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:32:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/authorization_bypass/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open WebUI IDOR Vulnerability in Retrieval API Allows Unauthorized Access and Modification of Knowledge Bases</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-webui-idor/</link><pubDate>Thu, 14 May 2026 20:32:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-webui-idor/</guid><description>Open WebUI is vulnerable to an IDOR vulnerability in its Retrieval API that bypasses knowledge base access controls, allowing any authenticated user who knows a private knowledge base UUID to read, inject content into, or overwrite another user's knowledge base.</description><content:encoded><![CDATA[<p>Open WebUI, a web interface for language models, is vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability in its Retrieval API. This flaw, identified in commit <code>4d058a125</code> (v0.8.11) on March 26, 2026, allows authenticated users to bypass knowledge base access controls. Specifically, the <code>_validate_collection_access</code> function fails to properly validate access to knowledge base collections, which use UUIDs as collection names. As a result, an attacker who knows the UUID of a private knowledge base can read its contents, inject malicious content, or even overwrite the entire knowledge base through the retrieval query endpoints. This vulnerability exists because the validation function only checks for &ldquo;user-memory-<em>&rdquo; and &ldquo;file-</em>&rdquo; prefixes, leaving knowledge base UUIDs unchecked. This vulnerability is reachable in default configurations, affecting any non-admin account.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains an authenticated account on the Open WebUI instance.</li>
<li>Victim user creates a private knowledge base containing sensitive information.</li>
<li>Attacker discovers the UUID of the victim&rsquo;s knowledge base through methods such as shared workspaces, model metadata leakage via the <code>/api/models/list</code> endpoint, URL leakage, or RAG citation metadata in shared chats.</li>
<li>Attacker crafts a malicious POST request to <code>/api/v1/retrieval/query/doc</code> or <code>/api/v1/retrieval/query/collection</code> with the victim&rsquo;s knowledge base UUID as the <code>collection_name</code>, bypassing authorization checks and reading the contents of the knowledge base.</li>
<li>Alternatively, the attacker crafts a POST request to <code>/api/v1/retrieval/process/text</code> with the victim&rsquo;s knowledge base UUID as the <code>collection_name</code> to inject attacker-controlled content into the knowledge base.</li>
<li>Or, the attacker crafts a POST request to <code>/api/v1/retrieval/process/web</code> or <code>/api/v1/retrieval/process/youtube</code> with the victim&rsquo;s knowledge base UUID as the <code>collection_name</code> to overwrite the victim&rsquo;s entire knowledge base.</li>
<li>The injected or replaced content is then used in downstream RAG processes, potentially leading to the exposure of sensitive information or prompt injection attacks.</li>
<li>The attacker successfully compromises the confidentiality, integrity, and availability of the victim&rsquo;s knowledge base.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows unauthorized access to private knowledge bases, potentially exposing sensitive information. Attackers can inject malicious content, leading to integrity breaches and potential prompt injection attacks. The ability to overwrite knowledge bases leads to availability issues and data destruction. A successful attack can compromise the confidentiality, integrity, and availability of user data, potentially affecting all users of the Open WebUI instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect unauthorized access to knowledge bases by monitoring API requests containing UUID-formatted <code>collection_name</code> parameters: <code>Detect Open WebUI Unauthorized Knowledge Base Access</code>.</li>
<li>Deploy the Sigma rule <code>Detect Open WebUI Knowledge Base Manipulation via Retrieval API</code> to identify malicious POST requests to <code>/api/v1/retrieval/process/*</code> endpoints with knowledge base UUIDs as <code>collection_name</code>.</li>
<li>Apply the remediation steps suggested in the original advisory by checking permission on the KB collection in the <code>_validate_collection_access</code> function.</li>
<li>Monitor web server logs for unusual activity related to the vulnerable endpoints (<code>/api/v1/retrieval/query/doc</code>, <code>/api/v1/retrieval/query/collection</code>, <code>/api/v1/retrieval/process/text</code>, <code>/api/v1/retrieval/process/web</code>, <code>/api/v1/retrieval/process/youtube</code>, <code>/api/v1/retrieval/process/file</code>, <code>/api/v1/retrieval/process/files/batch</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>authorization_bypass</category><category>data_manipulation</category></item></channel></rss>