๐Ÿ” CVE Alert

CVE-2026-44569

HIGH 7.1

Open WebUI: Insecure Message Access Breaks Authorization

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, there's an IDOR in the channels message management system that allows authenticated users to modify or delete any message within channels they have read access to. The vulnerability exists in the message update and delete endpoints, which implement channel-level authorization but completely lack message ownership validation. While the frontend correctly implements ownership checks (showing edit/delete buttons only for message owners or admins), the backend APIs bypass these protections by only validating channel access permissions without verifying that the requesting user owns the target message. This creates a client-side security control bypass where attackers can directly call the APIs to modify other users' messages. This vulnerability is fixed in 0.6.19.

CWE CWE-862
Vendor open-webui
Product open-webui
Published May 15, 2026
Stay Ahead of the Next One

Get instant alerts for open-webui open-webui

Be the first to know when new high vulnerabilities affecting open-webui open-webui are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
Low

Affected Versions

open-webui / open-webui
< 0.6.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/open-webui/open-webui/security/advisories/GHSA-jxwr-g6r6-j3fx