Home

Description

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the POST /api/v1/evaluations/feedback endpoint in Open WebUI v0.9.2 is vulnerable to mass assignment via FeedbackForm, which uses model_config = ConfigDict(extra='allow'). Due to an insecure dictionary merge order in insert_new_feedback(), an authenticated attacker can inject a user_id field in the request body that overwrites the server-derived value, creating feedback records attributed to any arbitrary user. This corrupts the model evaluation leaderboard (Elo ratings) and enables identity spoofing. This vulnerability is fixed in 0.9.5.

PUBLISHED Reserved 2026-05-12 | Published 2026-05-15 | Updated 2026-05-15 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Problem types

CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

< 0.9.5
affected

References

github.com/...-webui/security/advisories/GHSA-rjmp-vjf2-qf4g exploit

github.com/...-webui/security/advisories/GHSA-rjmp-vjf2-qf4g

cve.org (CVE-2026-45396)

nvd.nist.gov (CVE-2026-45396)

Download JSON