Vulnerability Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.11, the API /api/v1/notes/{note_id} endpoint lacks proper authorization checks, allowing authenticated users to retrieve notes belonging to other users by guessing or enumerating UUIDs. This results in unauthorized disclosure of potentially sensitive or private user data. This vulnerability is fixed in 0.8.11.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openwebui | Open Webui | < 0.8.11 |
Related Weaknesses (CWE)
References
- https://github.com/open-webui/open-webui/security/advisories/GHSA-x3qm-p8hr-3c3hExploitPatchVendor Advisory
- https://github.com/open-webui/open-webui/security/advisories/GHSA-x3qm-p8hr-3c3hExploitPatchVendor Advisory
FAQ
What is CVE-2026-45666?
CVE-2026-45666 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.11, the API /api/v1/notes/{note_id} endpoint lacks proper authorization checks, allowing...
How severe is CVE-2026-45666?
CVE-2026-45666 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-45666?
Check the references section above for vendor advisories and patch information. Affected products include: Openwebui Open Webui.