Vulnerability Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a user just needs to use the API endpoint: /api/chat/completions with their own API key (generated in OWUI) and the Chat ID of another user to continue the conversation of the other user. This vulnerability is fixed in 0.9.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openwebui | Open Webui | < 0.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/open-webui/open-webui/security/advisories/GHSA-gfm2-xm6c-37qcExploitMitigationVendor Advisory
- https://github.com/open-webui/open-webui/security/advisories/GHSA-gfm2-xm6c-37qcExploitMitigationVendor Advisory
FAQ
What is CVE-2026-45349?
CVE-2026-45349 is a vulnerability with a CVSS score of 7.1 (HIGH). Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a user just needs to use the API endpoint: /api/chat/completions with their own API k...
How severe is CVE-2026-45349?
CVE-2026-45349 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-45349?
Check the references section above for vendor advisories and patch information. Affected products include: Openwebui Open Webui.