πŸ” CVE Alert

CVE-2026-44571

MEDIUM 6.5

Open WebUI: Improper Authorization in Standard Channels Allows Message Updates with Read Permission

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.6, in standard channels (i.e., channels whose channel.type is neither group nor dm), the endpoint POST /api/v1/channels/{channel_id}/messages/{message_id}/update can be accessed with read permission only. When access_control is set to None, the authorization check has_access(..., type="read") evaluates to True, allowing users who are not the message owner to update messages. As a result, unauthorized modification of other users’ messages is possible. This vulnerability is fixed in 0.8.6.

CWE CWE-862
Vendor open-webui
Product open-webui
Published May 15, 2026
Last Updated May 15, 2026
Stay Ahead of the Next One

Get instant alerts for open-webui open-webui

Be the first to know when new medium vulnerabilities affecting open-webui open-webui are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

open-webui / open-webui
< 0.8.6

References

NVD β†— CVE.org β†— EPSS Data β†—
github.com: https://github.com/open-webui/open-webui/security/advisories/GHSA-jgj3-r8hr-9pjw