Home

Description

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whose admin role has been revoked retains admin privileges within their existing Socket.IO session for as long as they keep the connection alive (via automatic heartbeats). The gap is exclusive to the Socket.IO session cache. This vulnerability is fixed in 0.9.0.

PUBLISHED Reserved 2026-05-06 | Published 2026-05-15 | Updated 2026-05-15 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-613: Insufficient Session Expiration

Product status

< 0.9.0
affected

References

github.com/...-webui/security/advisories/GHSA-45m8-cpm2-3v65 exploit

github.com/...-webui/security/advisories/GHSA-45m8-cpm2-3v65

cve.org (CVE-2026-44553)

nvd.nist.gov (CVE-2026-44553)

Download JSON