Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whose admin role has been revoked retains admin privileges within their existing Socket.IO session for as long as they keep the connection alive (via automatic heartbeats). The gap is exclusive to the Socket.IO session cache. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in Open WebUI’s session management. When an administrator’s role is revoked, the application fails to purge the user’s existing Socket.IO session from the session pool. As a result, the compromised user continues to wield administrative privileges via the terminal that remains open, regardless of the updated role. This persistent access enables the attacker to read or manipulate other users’ notes—an inadvertent privilege escalation that compromises confidentiality. The weakness originates from improper session invalidation after a role change, which is identified as CWE‑613.

Affected Systems

The issue affects the open‑webui platform across all self‑hosted deployments running a version earlier than 0.9.0. Administrators or users who have been demoted during that time frame are at risk until the application is upgraded or sessions are reset.

Risk and Exploitability

The flaw carries a CVSS score of 8.1, indicating high severity. While the EPSS score is not published, no exploit reports are in the KEV catalog. Exploitation requires the attacker to have an active Socket.IO connection—which can be established through normal use of the web interface—and to have previously had their administrator role revoked. Once the session remains active, the attacker can perform unrestricted read access to the system’s note data. Consequently, the attack vector is web‑based, and the risk remains until the affected software is patched or sessions are reset.

Generated by OpenCVE AI on May 15, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open WebUI to version 0.9.0 or later, which resolves session invalidation.
  • Force a logout or clear the session pool for all users whose roles have changed or have been revoked, ensuring that stale sessions are terminated.
  • Configure automatic session timeout for Socket.IO connections to limit the duration of stale sessions.

Generated by OpenCVE AI on May 15, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-45m8-cpm2-3v65 Open WebUI: Stale Admin Role in Socket.IO Session Pool Enables Post-Demotion Cross-User Note Access
History

Fri, 15 May 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whose admin role has been revoked retains admin privileges within their existing Socket.IO session for as long as they keep the connection alive (via automatic heartbeats). The gap is exclusive to the Socket.IO session cache. This vulnerability is fixed in 0.9.0.
Title Open WebUI: Stale Admin Role in Socket.IO Session Pool Enables Post-Demotion Cross-User Note Access
Weaknesses CWE-613
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T20:23:00.509Z

Reserved: 2026-05-06T20:59:00.594Z

Link: CVE-2026-44553

cve-icon Vulnrichment

Updated: 2026-05-15T20:21:12.075Z

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:46.707

Modified: 2026-05-15T21:16:35.810

Link: CVE-2026-44553

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T22:00:12Z

Weaknesses