Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis database (a supported and documented deployment pattern, e.g., for multi-region deployments, blue-green setups, or cluster topologies), the unprefixed keys collide. An admin on Instance A writing to tool_servers overwrites the value read by Instance B — causing Instance B's users to receive Instance A's tool server configuration. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open WebUI uses Redis as a shared cache for tool server configuration. In versions prior to 0.9.0, the keys tool_servers and terminal_servers are stored without an instance prefix. When multiple Open WebUI instances share the same Redis database, a write by an administrator on one instance will overwrite the value read by another instance. This results in the second instance using the configuration of the first, effectively revealing another instance’s settings and potentially allowing the attacker to influence the target instance’s behavior. The vulnerability is a type of configuration data poisoning and can contribute to confidentiality and integrity violations.

Affected Systems

The affected product is open‑webui:open‑webui. All installations of Open WebUI earlier than version 0.9.0 that use Redis for caching and are configured to share a single Redis database across multiple instances are vulnerable. Deployments following the documented multi‑region, blue‑green, or cluster patterns that share a Redis instance are at risk.

Risk and Exploitability

The CVSS score of 8.7 reflects a high‑severity vulnerability with well‑defined attack conditions. Because no EPSS value is available, the exact probability of exploitation is unclear, but the issue is not listed in CISA’s KEV catalog. The attack vector is local to the administrative users of the shared Redis instance, and it requires that at least two Open WebUI instances be configured to use the same Redis database. Once an administrator uses the privileged access of one instance, they can immediately overwrite the configuration seen by users on another instance, creating a noticeable impact on a multi‑instance deployment.

Generated by OpenCVE AI on May 15, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open WebUI to version 0.9.0 or later.
  • If upgrade is not immediately possible, isolate each Open WebUI deployment to its own Redis database or use distinct namespaces.
  • Ensure administrative access to the shared Redis backend is tightly controlled, or apply config‑level restrictions to prevent unintended writes.

Generated by OpenCVE AI on May 15, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3x8w-4f7p-xxc2 Open WebUI: Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Enable Cross-Instance Cache Poisoning
History

Fri, 15 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis database (a supported and documented deployment pattern, e.g., for multi-region deployments, blue-green setups, or cluster topologies), the unprefixed keys collide. An admin on Instance A writing to tool_servers overwrites the value read by Instance B — causing Instance B's users to receive Instance A's tool server configuration. This vulnerability is fixed in 0.9.0.
Title Open WebUI: Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Enable Cross-Instance Cache Poisoning
Weaknesses CWE-668
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T19:57:22.801Z

Reserved: 2026-05-06T20:59:00.594Z

Link: CVE-2026-44552

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:46.570

Modified: 2026-05-15T20:16:46.570

Link: CVE-2026-44552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T22:00:12Z

Weaknesses