<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45400 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45400/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:37:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45400/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open WebUI SSRF Vulnerability via URL Parsing Discrepancy (CVE-2026-45400)</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-webui-ssrf/</link><pubDate>Thu, 14 May 2026 20:37:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-webui-ssrf/</guid><description>Open WebUI versions 0.9.4 and earlier are vulnerable to Server-Side Request Forgery (SSRF) due to a parsing difference between the urlparse and requests libraries in the `validate_url` function, allowing attackers to bypass URL validation and make requests to internal IP addresses.</description><content:encoded><![CDATA[<p>Open WebUI versions 0.9.4 and earlier contain a server-side request forgery (SSRF) vulnerability (CVE-2026-45400) in the <code>validate_url</code> function. The vulnerability arises from inconsistent URL parsing between the <code>urlparse</code> and <code>requests</code> libraries. Specifically, <code>urlparse</code> may interpret a URL like <code>http://127.0.0.1:6666\@1.1.1.1</code> as pointing to the public IP address <code>1.1.1.1</code>, while the <code>requests</code> library interprets it as the internal IP address <code>127.0.0.1:6666</code>. This discrepancy allows an attacker to bypass the intended URL validation and make unauthorized requests to internal resources. Successful exploitation can lead to information disclosure or further internal network compromise. The vulnerability was reported on May 14, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious URL with the format <code>http://127.0.0.1:6666\@public.ip.address</code>.</li>
<li>The user provides the crafted URL to Open WebUI, which uses the <code>validate_url</code> function to validate the URL.</li>
<li>The <code>validate_url</code> function uses <code>urllib.parse.urlparse</code> to parse the hostname of the URL.</li>
<li><code>urllib.parse.urlparse</code> incorrectly identifies the hostname as <code>public.ip.address</code> due to the presence of the <code>@</code> symbol after the internal IP address.</li>
<li>The validation logic considers <code>public.ip.address</code> as a public IP and approves the URL.</li>
<li>The application then uses the <code>requests.get</code> function to make a request to the validated URL.</li>
<li><code>requests.get</code> interprets the URL differently and sends the request to the internal IP address <code>127.0.0.1:6666</code>.</li>
<li>The attacker successfully makes a request to the internal IP address, achieving SSRF and potentially gaining access to sensitive information or internal services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-45400) in Open WebUI can allow an attacker to bypass URL validation and make unauthorized requests to internal resources. This may lead to information disclosure, access to internal services, or further compromise of the internal network. The severity is rated as high due to the potential for significant impact on confidentiality and integrity. Affected organizations may experience data breaches or service disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Open WebUI that addresses the URL parsing discrepancy.</li>
<li>Deploy the Sigma rule <code>Detect Open WebUI SSRF Attempt via Malicious URL</code> to detect attempts to exploit this vulnerability.</li>
<li>Review and harden URL validation logic within the Open WebUI application to ensure consistent parsing across different libraries.</li>
<li>Implement network segmentation and access controls to limit the impact of potential SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ssrf</category><category>cve-2026-45400</category><category>open-webui</category><category>web-application</category><category>github-advisory</category></item></channel></rss>