Authorization Bypass Through User-Controlled Key Affecting open-webui package, versions [,0.9.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-OPENWEBUI-16755448
  • published19 May 2026
  • disclosed14 May 2026
  • creditMrBeard-FT, Classic298

Introduced: 14 May 2026

NewCVE-2026-45402  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

Upgrade open-webui to version 0.9.5 or higher.

Overview

open-webui is an Open WebUI

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the get_folders and process_chat_payload paths in the folder and chat handling code. An attacker can read files and knowledge collections they do not have access to by attaching them to a folder or causing chat processing to consume folder-backed RAG context, thereby exposing restricted content to the requester. The same issue also allows a user to add unreadable files to knowledge bases via the knowledge upload endpoints, causing private file contents to be ingested and surfaced through chat and retrieval features.

CVSS Base Scores

version 4.0
version 3.1