Description
Open WebUI load_tool_module_by_id Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Open WebUI. Authentication is required to exploit this vulnerability.

The specific flaw exists within the load_tool_module_by_id function. The issue results from the lack of proper validation of a user-supplied string before using it to execute Python code. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-28257.
Published: 2026-01-23
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw exists in the load_tool_module_by_id function of Open WebUI. A lack of proper validation on a user‑supplied string allows execution of arbitrary Python code. Attackers can trigger remote code execution on the service account, leading to full compromise of the affected system.

Affected Systems

Open WebUI version 0.6.32 installations are affected. The vulnerability is tied to the load_tool_module_by_id endpoint in this product; no other version information was provided.

Risk and Exploitability

The CVSS score of 8.8 classifies this as high severity. The EPSS score below 1% indicates a low probability of exploitation at this time, and it is not listed in the KEV catalog. Because authentication is required, an attacker must possess valid credentials or have compromised an account. Once authenticated, a crafted malicious string can be passed to the function, which executes it as Python code, giving the attacker full control of the service.

Generated by OpenCVE AI on April 18, 2026 at 03:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Open WebUI release that contains the fix for the load_tool_module_by_id injection vulnerability.
  • Limit access to the load_tool_module_by_id endpoint so that only trusted, authenticated users can invoke it, and enforce strong authentication such as MFA.
  • Enable logging and monitoring for unusual calls to load_tool_module_by_id, and investigate any anomalous activity promptly.

Generated by OpenCVE AI on April 18, 2026 at 03:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Openwebui
Openwebui open Webui
CPEs cpe:2.3:a:openwebui:open_webui:0.6.32:*:*:*:*:*:*:*
Vendors & Products Openwebui
Openwebui open Webui

Fri, 23 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 23 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
Description Open WebUI load_tool_module_by_id Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Open WebUI. Authentication is required to exploit this vulnerability. The specific flaw exists within the load_tool_module_by_id function. The issue results from the lack of proper validation of a user-supplied string before using it to execute Python code. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-28257.
Title Open WebUI load_tool_module_by_id Command Injection Remote Code Execution Vulnerability
Weaknesses CWE-94
References
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Open-webui Open-webui
Openwebui Open Webui
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-02-26T14:44:27.589Z

Reserved: 2026-01-08T22:50:07.378Z

Link: CVE-2026-0766

cve-icon Vulnrichment

Updated: 2026-01-23T16:34:12.917Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-23T04:16:03.527

Modified: 2026-01-30T19:47:56.023

Link: CVE-2026-0766

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:30:25Z

Weaknesses