๐Ÿ” CVE Alert

CVE-2026-4993

LOW 3.3

wandb OpenUI config.py hard-coded credentials

CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
1th

A vulnerability has been found in wandb OpenUI up to 0.0.0.0/1.0. This impacts an unknown function of the file backend/openui/config.py. The manipulation of the argument LITELLM_MASTER_KEY leads to hard-coded credentials. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CWE CWE-798 CWE-259
Vendor wandb
Product openui
Published Mar 28, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for wandb openui

Be the first to know when new low vulnerabilities affecting wandb openui are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

wandb / OpenUI
0.0.0 1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.353880 vuldb.com: https://vuldb.com/?ctiid.353880 vuldb.com: https://vuldb.com/?submit.778265 gist.github.com: https://gist.github.com/YLChen-007/3bf37486022d4c57caec3a35cd79ac92

Credits

๐Ÿ” Eric-b (VulDB User) VulDB