Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, any authenticated user can overwrite any file's content by ID through the `POST /api/v1/retrieval/process/files/batch` endpoint. The endpoint performs no ownership check, so a regular user with read access to a shared knowledge base can obtain file UUIDs via `GET /api/v1/knowledge/{id}/files` and then overwrite those files, escalating from read to write. The overwritten content is served to the LLM via RAG, meaning the attacker controls what the model tells other users. Version 0.8.6 patches the issue.
Published: 2026-03-26
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized file overwrite enabling manipulation of LLM outputs
Action: Patch ASAP
AI Analysis

Impact

The flaw in Open WebUI's process_files_batch endpoint allows any authenticated user to overwrite files without verifying ownership. This permits an attacker to replace content in files that are later retrieved by the LLM for Retrieval-Augmented Generation, thereby controlling the information the model presents to other users. The vulnerability is a classic case of privilege escalation (CWE‑639) and, with a CVSS score of 7.1, represents a moderate to high severity risk.

Affected Systems

The vulnerability affects installations of Open WebUI prior to version 0.8.6. Users running an earlier release are susceptible; the issue was fixed in 0.8.6 and later versions. Administrators should verify the exact deployment version and confirm that upgrades have been applied.

Risk and Exploitability

The attack requires authenticated access and the ability to read file UUIDs via the knowledge base API. An attacker with read rights can obtain a list of file identifiers, then use the vulnerable endpoint to replace content. The exploit is straightforward once the necessary permissions are present, but no elevated privileges are needed beyond an authenticated session. The CVSS score of 7.1 reflects the ability to tamper with data that feeds the LLM. EPSS information is unavailable, and the vulnerability is not listed in the CISA KEV catalog, but the potential for targeted attacks against internal deployments remains significant.

Generated by OpenCVE AI on March 27, 2026 at 06:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the 0.8.6 patch or newer version of Open WebUI immediately
  • Verify that the process_files_batch endpoint now checks file ownership before allowing writes
  • Restrict user permissions to only those necessary, and audit knowledge base file access to detect unusual overwrite activity

Generated by OpenCVE AI on March 27, 2026 at 06:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jjp7-g2jw-wh3j Open WebUI's process_files_batch() endpoint missing ownership check, allows unauthorized file overwrite
History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, any authenticated user can overwrite any file's content by ID through the `POST /api/v1/retrieval/process/files/batch` endpoint. The endpoint performs no ownership check, so a regular user with read access to a shared knowledge base can obtain file UUIDs via `GET /api/v1/knowledge/{id}/files` and then overwrite those files, escalating from read to write. The overwritten content is served to the LLM via RAG, meaning the attacker controls what the model tells other users. Version 0.8.6 patches the issue.
Title Open WebUI's process_files_batch() endpoint missing ownership check, allows unauthorized file overwrite
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T23:38:20.726Z

Reserved: 2026-03-03T14:25:19.244Z

Link: CVE-2026-28788

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T00:16:22.673

Modified: 2026-03-27T00:16:22.673

Link: CVE-2026-28788

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:44Z

Weaknesses