Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
8.7 HIGH
CVE-2026-45315 — Open WebUI: Stored XSS via attacker-controlled file extension in /api/v1/audio/transcript…

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-suppl…

open_webui | Remote | Cross-Site Scripting
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
7.4 HIGH
CVE-2026-45314 — Open WebUI: XSS via SVG in /api/v1/channels/webhooks/{webhook_id}/profile/image

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the channel webhook create/update flow accepts arbitrary profile_image_url values, i…

open_webui | Remote | Cross-Site Scripting
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
7.7 HIGH
CVE-2026-45303 — Open WebUI: Stored XSS via the HTML renedering view

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend …

open_webui | Remote | Cross-Site Scripting
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
8.1 HIGH
CVE-2026-45301 — Open WebUI: Missing permission check in files API allows authenticated users to list, acc…

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authentica…

open_webui | Remote | Authorization
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
5.4 MEDIUM
CVE-2026-45299 — Open WebUI: Stored Cross-Site Scripting In Profile Picture

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, the profile_image_url field on the user profile update form accepted arbitrary data:…

open_webui | Remote | Cross-Site Scripting
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
6.5 MEDIUM
CVE-2026-44571 — Open WebUI: Improper Authorization in Standard Channels Allows Message Updates with Read …

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.6, in standard channels (i.e., channels whose channel.type is neither group nor dm), th…

open_webui | Remote | Authorization
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
8.3 HIGH
CVE-2026-44570 — Open WebUI: Inconsistent authorization controls within memories API

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in…

open_webui | Remote | Authorization
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
7.1 HIGH
CVE-2026-44569 — Open WebUI: Insecure Message Access Breaks Authorization

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, there's an IDOR in the channels message management system that allows authenticated…

open_webui | Remote | Authorization
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
7.3 HIGH
CVE-2026-44567 — Open WebUI: Open WebUI Improper Authorization Control

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.1.124, the API does not properly validate that the user has an authorized user role of us…

open_webui | Remote | Authentication
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
7.3 HIGH
CVE-2026-44566 — Open WebUI: Arbitrary File Upload and Path Traversal

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.1.124, when attaching files to a promp, the name of the file is derived from the original…

open_webui | Remote | Path Traversal
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
8.1 HIGH
CVE-2026-44565 — Open WebUI: Open WebUI Arbitrary File Write, Delete via Path Traversal

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTT…

open_webui | Remote | Path Traversal
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
7.3 HIGH
CVE-2026-44549 — Open WebUI: Stored XSS in excel file preview

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, Excel file attachments are previewed in an unsafe way. A crafted XLSX file payload c…

open_webui | Remote | Cross-Site Scripting
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
8.7 HIGH
CVE-2026-8696 — radare2 6.1.5 Use-After-Free via gdbr_pids_list()

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbi…

Remote | Memory Corruption
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
8.8 HIGH
CVE-2026-45672 — Open WebUI: Jupyter code execution works despite `ENABLE_CODE_EXECUTION=false` — feature …

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter …

open_webui | Remote | Authentication
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
8.1 HIGH
CVE-2026-45402 — Open WebUI: Cross-User File Access via Unchecked file_id in Folder Knowledge and Knowledg…

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to …

open_webui | Remote | Authorization
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
8.5 HIGH
CVE-2026-45401 — Open WebUI: SSRF Bypass via HTTP Redirect Following in Web-Fetch and Image-Load Endpoints

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only valida…

open_webui | Remote | Server-Side Request Forgery
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
8.5 HIGH
CVE-2026-45400 — Open WebUI: Server-Side Request Forgery (SSRF) bypass in `validate_url`

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypa…

open_webui | Remote | Server-Side Request Forgery
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
7.5 HIGH
CVE-2026-45398 — Open WebUI: IDOR - Retrieval API Bypasses Knowledge Base Access Controls

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name pr…

open_webui | Remote | Authorization
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
5.3 MEDIUM
CVE-2026-45397 — Open WebUI: Unauthenticated RAG Configuration Disclosure

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, GET /api/v1/retrieval/ returns live RAG pipeline configuration to any unauthenticate…

open_webui | Remote | Information Disclosure
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
5.4 MEDIUM
CVE-2026-45396 — Open WebUI: Mass Assignment via FeedbackForm extra=allow Allows Feedback User ID Spoofing…

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the POST /api/v1/evaluations/feedback endpoint in Open WebUI v0.9.2 is vulnerable to…

open_webui | Remote | Authentication
May 15, 2026 May 15, 2026
May 15, 2026
May 15, 2026
Showing 20 of 6251 Results