Home

Description

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically, DOMPurify is executed before the marked library). This vulnerability allows a compromised or malicious administrator to plant a malicious payload in the global banner. Crucially, this vector enables Privilege Escalation, as the malicious banner is rendered for all users, including the Super Admin (Primary Admin). Consequently, the payload successfully bypasses the existing security mechanism. An attacker can leverage this to steal the Super Admin's session token This vulnerability is fixed in 0.8.0.

PUBLISHED Reserved 2026-05-12 | Published 2026-05-15 | Updated 2026-05-18 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 0.8.0
affected

References

github.com/...-webui/security/advisories/GHSA-cqp4-qqvg-3787 exploit

github.com/...-webui/security/advisories/GHSA-cqp4-qqvg-3787

cve.org (CVE-2026-45665)

nvd.nist.gov (CVE-2026-45665)

Download JSON