Home

Description

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, FolderForm uses model_config = ConfigDict(extra='allow'), which permits arbitrary fields to pass through Pydantic validation and be included in model_dump(exclude_unset=True). In insert_new_folder, the server-assigned user_id is placed at the start of the dict and then overwritten by the spread of form data. Because FolderModel declares user_id: str as a real field (not just a form extra), any attacker-supplied user_id in the POST body is accepted by the model and persisted on the Folder row. This vulnerability is fixed in 0.9.0.

PUBLISHED Reserved 2026-05-06 | Published 2026-05-15 | Updated 2026-05-15 | Assigner GitHub_M




MEDIUM: 5.0CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N

Problem types

CWE-862: Missing Authorization

Product status

< 0.9.0
affected

References

github.com/...-webui/security/advisories/GHSA-hr43-rjmr-7wmm

cve.org (CVE-2026-44550)

nvd.nist.gov (CVE-2026-44550)

Download JSON