Server-side Request Forgery (SSRF) Affecting open-webui package, versions [0.3.31, 0.9.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.01% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-OPENWEBUI-16735448
  • published18 May 2026
  • disclosed14 May 2026
  • creditdkonis, wlayzz

Introduced: 14 May 2026

NewCVE-2026-45331  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade open-webui to version 0.9.0 or higher.

Overview

open-webui is an Open WebUI

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the validate_url function in the URL validation component. An attacker can bypass private-address checks by supplying a hostname that resolves to a private IPv6 address, causing the loader to accept URLs that point at loopback, link-local, or other non-public targets.

Notes

  • The vulnerable check runs on every code path that calls validate_url(), so the same SSRF bypass applies beyond the web-search flow the advisory highlights; the maintainer note names /api/v1/retrieval/process/web and /api/v1/images/edit as examples of callers.
  • The bypass is broader than plain private IPv6: IPv4-mapped IPv6 literals and several non-global IPv4 ranges also slip past the validator-based filtering, so deployments that only expected to block RFC1918 space can still be exposed to metadata, loopback, and other reserved targets.

CVSS Base Scores

version 4.0
version 3.1