<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Owasp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/owasp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 19:45:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/owasp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open WebUI /responses Endpoint Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-open-webui-auth-bypass/</link><pubDate>Fri, 08 May 2026 19:45:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-open-webui-auth-bypass/</guid><description>The /responses endpoint in Open WebUI's OpenAI router lacks access control, allowing authenticated users to bypass per-model access controls and interact with any configured model, potentially leading to denial of service, model theft, and access policy bypass.</description><content:encoded><![CDATA[<p>Open WebUI versions 0.8.12 and earlier contain an authentication bypass vulnerability in the /responses endpoint of the OpenAI router. This endpoint, intended as a proxy to upstream LLM providers, fails to enforce per-model access controls. While the primary chat completion endpoint (generate_chat_completion) correctly validates model ownership, group membership, and AccessGrants, the /responses endpoint only verifies a valid user session. Consequently, any authenticated user can interact with any model configured on the Open WebUI instance, regardless of their assigned roles or group memberships, by sending a crafted POST request to /api/openai/responses with an arbitrary model ID. This circumvents intended access restrictions and poses risks to service availability, model security, and policy enforcement.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid user credentials for the Open WebUI instance. This could be through credential stuffing, phishing, or other common methods.</li>
<li>The attacker authenticates to the Open WebUI instance using the obtained credentials.</li>
<li>The attacker crafts a POST request to the <code>/api/openai/responses</code> endpoint.</li>
<li>The attacker includes an arbitrary model ID in the POST request body, specifying a model they do not have explicit access to under normal access control policies.</li>
<li>The Open WebUI instance, upon receiving the request at <code>/api/openai/responses</code>, only verifies the user&rsquo;s session.</li>
<li>Due to the missing access control checks, the request is forwarded to the upstream LLM provider, effectively bypassing the intended access restrictions.</li>
<li>The upstream LLM provider processes the request using the specified model, even though the user lacks authorization.</li>
<li>The attacker receives the response from the LLM, successfully interacting with a restricted model.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can have significant consequences. Unauthorized users can submit resource-intensive requests to expensive models, leading to Model Denial of Service (OWASP LLM04) by exhausting API budgets or rate limits, potentially causing total service disruption for legitimate users. Furthermore, if the instance proxies access to fine-tuned or self-hosted models, unauthorized interaction can lead to Model Theft (OWASP LLM10), enabling capability extraction or model distillation. Finally, the vulnerability undermines existing access control systems, preventing administrators from enforcing cost-tier restrictions, team-based model assignments, or compliance boundaries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Open WebUI version 0.8.13 or later to patch CVE-2026-44556 and address the authentication bypass vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect Open WebUI Unauthorized Model Access via Responses Endpoint&rdquo; to identify potential exploitation attempts by monitoring POST requests to <code>/api/openai/responses</code> with potentially malicious model IDs.</li>
<li>Review Open WebUI access logs for any suspicious activity related to the <code>/api/openai/responses</code> endpoint, particularly requests from users who should not have access to specific models.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>llm</category><category>owasp</category></item></channel></rss>