Impact
Open WebUI permits any authenticated user to read other users' private memories through the /api/v1/retrieval/query/collection endpoint. This flaw represents an insecure direct object reference that can expose sensitive user data. The weakness falls under CWE-639. Because the endpoint does not enforce proper ownership checks, an attacker can retrieve confidential memory contents belonging to other users, potentially leading to privacy violations.
Affected Systems
The vulnerability affects the Open WebUI product from the open-webui vendor. All releases prior to version 0.8.6 are impacted. The issue was fixed in version 0.8.6, which removes the IDOR path. Users running earlier versions should upgrade immediately.
Risk and Exploitability
The CVSS base score is 3.1, indicating a low severity. EPSS is not available, and it is not included in the CISA KEV catalog. The flaw requires an authenticated user to exploit, so it is not a remote code execution bug but still permits unauthorized data access. Attackers who have legitimate credentials but malicious intent can exploit the endpoint to harvest private memories, making the vulnerability useful in insider threat scenarios. Since it does not affect system integrity or availability, the risk is primarily confidentiality.
OpenCVE Enrichment
Github GHSA