CVE-2026-45347
Open WebUI: Blind server side request forgery (SSRF) via the PDF generate function
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.5.11, there is a blind server side request forgery (SSRF) via the PDF generate function. In the PDF export, user inputs are interpreted as HTML and embedded into the PDF. According to tests, scripts and some potentially dangerous tags (iFrame, Object, etc.) are blocked, preventing server-side content from being read through this vulnerability. However, an image tag can be used to force a server-side request (SSRF), as shown in the following below. This vulnerability is fixed in 0.5.11.
| CWE | CWE-918 |
| Vendor | open-webui |
| Product | open-webui |
| Published | May 15, 2026 |
Stay Ahead of the Next One
Get instant alerts for open-webui open-webui
Be the first to know when new medium vulnerabilities affecting open-webui open-webui are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Affected Versions
open-webui / open-webui
< 0.5.11