<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45350 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45350/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:26:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45350/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open WebUI Chat Completion API Tool Restriction Bypass (CVE-2026-45350)</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-webui-tool-bypass/</link><pubDate>Thu, 14 May 2026 20:26:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-webui-tool-bypass/</guid><description>Open WebUI versions prior to 0.8.6 contain a vulnerability in the chat completion API that allows attackers to bypass tool restrictions by invoking any server tool with elevated privileges by supplying the correct tool_id or tool_servers parameters; this issue is tracked as CVE-2026-45350.</description><content:encoded><![CDATA[<p>Open WebUI is vulnerable to a tool restriction bypass in its chat completion API. Specifically, versions 0.6.43 through 0.8.5 are affected. The vulnerability, identified as CVE-2026-45350, stems from a lack of proper permission checks when retrieving tools via the <code>get_tool_by_id</code> function. An attacker can exploit this by supplying arbitrary <code>tool_id</code> or <code>tool_servers</code> parameters through the chat completion API, thereby invoking restricted server tools with elevated privileges. This occurs because the authentication token stored on the server is used when invoking the tool, effectively granting the attacker server-level privileges. The issue was resolved in versions v0.7.0 and v0.8.6.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker with low privileges gains access to an Open WebUI instance.</li>
<li>The attacker identifies a restricted tool configured within the Open WebUI instance.</li>
<li>The attacker crafts a malicious request to the <code>/api/chat/completions</code> endpoint.</li>
<li>The request includes a prompt designed to utilize the restricted tool.</li>
<li>The request contains the <code>tool_ids</code> parameter set to the ID of the restricted tool, or the <code>tool_servers</code> parameter, pointing to the restricted tool&rsquo;s server.</li>
<li>The <code>get_tool_by_id</code> function retrieves the tool without proper permission checks.</li>
<li>The server&rsquo;s authentication token is used to invoke the tool.</li>
<li>The restricted tool executes with server privileges, potentially leading to unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows low-privilege users to bypass intended tool restrictions and execute privileged actions within the Open WebUI environment. This can lead to unauthorized data access, modification, or other malicious activities, effectively escalating the attacker&rsquo;s privileges and compromising the integrity of the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Open WebUI to version 0.8.6 or later to remediate CVE-2026-45350.</li>
<li>Deploy the provided Sigma rule <code>Detect Open WebUI Chat Completion API Tool Restriction Bypass</code> to identify attempts to exploit this vulnerability via HTTP requests to the <code>/api/chat/completions</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests containing <code>tool_ids</code> parameters associated with restricted tools to detect potential exploitation attempts.</li>
<li>Review and enforce proper access controls for tools within Open WebUI to prevent unauthorized usage, in addition to patching.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>cve-2026-45350</category><category>privilege escalation</category><category>web application</category></item></channel></rss>