CVE-2026-44571
Open WebUI: Improper Authorization in Standard Channels Allows Message Updates with Read Permission
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.6, in standard channels (i.e., channels whose channel.type is neither group nor dm), the endpoint POST /api/v1/channels/{channel_id}/messages/{message_id}/update can be accessed with read permission only. When access_control is set to None, the authorization check has_access(..., type="read") evaluates to True, allowing users who are not the message owner to update messages. As a result, unauthorized modification of other usersβ messages is possible. This vulnerability is fixed in 0.8.6.
| CWE | CWE-862 |
| Vendor | open-webui |
| Product | open-webui |
| Published | May 15, 2026 |
| Last Updated | May 15, 2026 |
Get instant alerts for open-webui open-webui
Be the first to know when new medium vulnerabilities affecting open-webui open-webui are published β delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N