<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Feature-Bypass — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/feature-bypass/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:30:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/feature-bypass/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open WebUI Code Execution Bypass via Feature Gate Neglect (CVE-2026-45672)</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-webui-code-exec-bypass/</link><pubDate>Thu, 14 May 2026 20:30:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-webui-code-exec-bypass/</guid><description>Open WebUI versions 0.8.11 and earlier are vulnerable to arbitrary code execution due to a bypassed feature gate; the `/api/v1/utils/code/execute` endpoint allows authenticated users to execute Python code via Jupyter even when code execution is disabled, leading to potential data exfiltration and code execution (CVE-2026-45672).</description><content:encoded><![CDATA[<p>Open WebUI versions 0.8.11 and earlier are vulnerable to a code execution bypass. The vulnerability resides in the <code>/api/v1/utils/code/execute</code> endpoint, which incorrectly allows authenticated users to execute arbitrary Python code via the Jupyter server, even when the administrator has explicitly disabled code execution by setting <code>ENABLE_CODE_EXECUTION=false</code> in the application configuration. This issue was verified against Open WebUI v0.8.11 running in a Docker container on March 25, 2026. The absence of proper authorization checks on this API endpoint makes the configured feature gate ineffective, thereby creating a security loophole that could be exploited to gain unauthorized access and control over the system&rsquo;s internal services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Open WebUI application as a valid user.</li>
<li>The attacker crafts a POST request to the <code>/api/v1/utils/code/execute</code> endpoint.</li>
<li>The POST request includes a JSON payload containing the <code>code</code> parameter with the Python code to be executed. Example: <code>{&quot;code&quot;:&quot;import os; print(os.popen(\&quot;id\&quot;).read())&quot;}</code></li>
<li>The Open WebUI backend receives the request and, without checking the <code>ENABLE_CODE_EXECUTION</code> flag, forwards the code to the connected Jupyter server.</li>
<li>The Jupyter server executes the provided Python code within its container.</li>
<li>The executed code uses the <code>os.popen()</code> function to execute shell commands.</li>
<li>The Jupyter container, due to its network configuration, can access internal Docker services.</li>
<li>The attacker obtains the output of the executed code and any internal service data accessible from the Jupyter container, potentially exfiltrating sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows any authenticated user to execute arbitrary Python code in the Jupyter container, even when code execution is disabled. This leads to: arbitrary code execution in the Jupyter container, giving the attacker the ability to read files and spawn processes; network access to internal Docker services; data exfiltration from internal services; rendering the admin&rsquo;s security configuration ineffective and creating a false sense of security for users who believe code execution is disabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Open WebUI to version 0.8.12 or later to patch CVE-2026-45672, as the vulnerability has been fixed in this version.</li>
<li>Deploy the Sigma rule &ldquo;Detect Open WebUI Code Execution Bypass via API Endpoint&rdquo; to monitor for requests to the <code>/api/v1/utils/code/execute</code> endpoint.</li>
<li>Review the network configuration of the Jupyter container to restrict access to internal Docker services, mitigating the potential impact of successful code execution.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-execution</category><category>feature-bypass</category><category>web-application</category></item></channel></rss>