| Vendor | Product | Version Range | Status |
|---|---|---|---|
| open-webui | open-webui | < 0.9.5 | affected |
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| open-webui | open-webui | < 0.9.5 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-44551 | 9.1 CRITICAL | Open WebUI: LDAP Empty Password Authentication Bypass |
| CVE-2026-45672 | 8.8 HIGH | Open WebUI: Jupyter code execution works despite `ENABLE_CODE_EXECUTION=false` — feature g |
| CVE-2026-45315 | 8.7 HIGH | Open WebUI: Stored XSS via attacker-controlled file extension in /api/v1/audio/transcripti |
| CVE-2026-44552 | 8.7 HIGH | Open WebUI: Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Ena |
| CVE-2026-45331 | 8.5 HIGH | Open WebUI: Full SSRF Vulnerability in the RAG Web Search Feature |
| CVE-2026-45400 | 8.5 HIGH | Open WebUI: Server-Side Request Forgery (SSRF) bypass in `validate_url` |
| CVE-2026-45401 | 8.5 HIGH | Open WebUI: SSRF Bypass via HTTP Redirect Following in Web-Fetch and Image-Load Endpoints |
| CVE-2026-44570 | 8.3 HIGH | Open WebUI: Inconsistent authorization controls within memories API |
| CVE-2026-44565 | 8.1 HIGH | Open WebUI: Open WebUI Arbitrary File Write, Delete via Path Traversal |
| CVE-2026-44553 | 8.1 HIGH | Open WebUI: Stale Admin Role in Socket.IO Session Pool Enables Post-Demotion Cross-User No |
| CVE-2026-45675 | 8.1 HIGH | Open WebUI: LDAP and OAuth First-User Race Condition Allows Multiple Admin Accounts |
| CVE-2026-44554 | 8.1 HIGH | Open WebUI: Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overw |
| CVE-2026-45301 | 8.1 HIGH | Open WebUI: Missing permission check in files API allows authenticated users to list, acce |
| CVE-2026-45665 | 8.1 HIGH | Open WebUI: Stored XSS in Banner Component via Improper Sanitization Order |
| CVE-2026-45402 | 8.1 HIGH | Open WebUI: Cross-User File Access via Unchecked file_id in Folder Knowledge and Knowledge |
| CVE-2026-45671 | 8.0 HIGH | Open WebUI: shared-chat branch ignores access_type, allowing unauthorized file deletion |
| CVE-2026-45303 | 7.7 HIGH | Open WebUI: Stored XSS via the HTML renedering view |
| CVE-2026-45338 | 7.7 HIGH | Open WebUI: SSRF via OAuth Profile Picture URL in _process_picture_url (oauth.py) |
| CVE-2026-44555 | 7.6 HIGH | Open WebUI: Base Model Routing Bypasses Access Control via Model Chaining |
| CVE-2026-45398 | 7.5 HIGH | Open WebUI: IDOR - Retrieval API Bypasses Knowledge Base Access Controls |
Showing top 20 of 59 CVEs. View all on vendor page → →
No comments yet