Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, any authenticated user can overwrite any file's content by ID through the `POST /api/v1/retrieval/process/files/batch` endpoint. The endpoint performs no ownership check, so a regular user with read access to a shared knowledge base can obtain file UUIDs via `GET /api/v1/knowledge/{id}/files` and then overwrite those files, escalating from read to write. The overwritten content is served to the LLM via RAG, meaning the attacker controls what the model tells other users. Version 0.8.6 patches the issue.
Published: 2026-03-26
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized file overwrite
Action: Patch Now
AI Analysis

Impact

A documented weakness in Open WebUI allows any authenticated user with read access to a shared knowledge base to overwrite the content of any file through the POST /api/v1/retrieval/process/files/batch endpoint. The endpoint does not perform an ownership check, enabling attackers to replace legitimate files that are later retrieved by the LLM during retrieval‑augmented generation. This flaw is an authorization bypass (CWE‑639) and could let an attacker control what information the model presents to other users.

Affected Systems

The defect exists in all installations of the Open WebUI self‑hosted artificial intelligence platform running a version earlier than 0.8.6. Users who can authenticate and query a knowledge base can discover file identifiers via GET /api/v1/knowledge/{id}/files and exploit the vulnerability through the batch processing endpoint.

Risk and Exploitability

The CVSS score of 7.1 indicates a moderate‑high severity, while an EPSS score of less than 1% points to a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog, which reduces confirmation of real‑world usage. Attackers would need only a valid authenticated session and read permission on a shared resource; no elevated system privileges are required, making exploitation relatively straightforward in a compromised or poorly protected instance.

Generated by OpenCVE AI on April 2, 2026 at 03:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open WebUI to version 0.8.6 or later, which includes the ownership check that fixes the issue.

Generated by OpenCVE AI on April 2, 2026 at 03:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jjp7-g2jw-wh3j Open WebUI's process_files_batch() endpoint missing ownership check, allows unauthorized file overwrite
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Openwebui
Openwebui open Webui
CPEs cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:*
Vendors & Products Openwebui
Openwebui open Webui

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, any authenticated user can overwrite any file's content by ID through the `POST /api/v1/retrieval/process/files/batch` endpoint. The endpoint performs no ownership check, so a regular user with read access to a shared knowledge base can obtain file UUIDs via `GET /api/v1/knowledge/{id}/files` and then overwrite those files, escalating from read to write. The overwritten content is served to the LLM via RAG, meaning the attacker controls what the model tells other users. Version 0.8.6 patches the issue.
Title Open WebUI's process_files_batch() endpoint missing ownership check, allows unauthorized file overwrite
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}


Subscriptions

Open-webui Open-webui
Openwebui Open Webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T20:08:17.320Z

Reserved: 2026-03-03T14:25:19.244Z

Link: CVE-2026-28788

cve-icon Vulnrichment

Updated: 2026-03-27T20:08:14.289Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T00:16:22.673

Modified: 2026-04-01T16:12:25.257

Link: CVE-2026-28788

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:56:03Z

Weaknesses