Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: True). It performs no authorization check on whether the calling user owns or has write access to the target collection. When overwrite=True, save_docs_to_vector_db calls VECTOR_DB_CLIENT.delete_collection() on the target collection before writing new content. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw lies in the POST /api/v1/retrieval/process/web endpoint, which lacks an authorization check on the supplied collection_name and overwrite flag. When overwrite=True, the application deletes the target collection before writing new data, allowing an attacker to delete or overwrite any collection. This leads to loss of stored knowledge and potential manipulation of Retrieval Augmented Generation content, compromising both integrity and availability. The weakness is classified as CWE‑862, Unauthorized Access.

Affected Systems

The affected product is open‑webui. All publicly available versions prior to 0.9.0 are vulnerable. The patch was applied in release 0.9.0, so any deployment running an earlier version must be updated.

Risk and Exploitability

The CVSS score of 8.1 reflects a high severity, and the EPSS score is not available, so the realistic exploitation probability is unclear. The vulnerability is not yet listed in CISA’s KEV catalog. Based on the description, it is inferred that the threat vector is remote, over HTTP/HTTPS, and that an attacker does not require prior authentication to exploit the endpoint, enabling broad potential impact.

Generated by OpenCVE AI on May 15, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade open-webui to version 0.9.0 or later
  • If the upgrade cannot be performed immediately, restrict or disable the /api/v1/retrieval/process/web endpoint to authenticated and authorized users
  • Implement proper access control in the application to verify ownership before allowing collection modifications

Generated by OpenCVE AI on May 15, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7r82-qhg4-6wvj Open WebUI has Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overwrite
History

Fri, 15 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: True). It performs no authorization check on whether the calling user owns or has write access to the target collection. When overwrite=True, save_docs_to_vector_db calls VECTOR_DB_CLIENT.delete_collection() on the target collection before writing new content. This vulnerability is fixed in 0.9.0.
Title Open WebUI: Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overwrite
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T21:09:28.210Z

Reserved: 2026-05-06T20:59:00.594Z

Link: CVE-2026-44554

cve-icon Vulnrichment

Updated: 2026-05-15T21:09:20.734Z

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:46.840

Modified: 2026-05-15T20:16:46.840

Link: CVE-2026-44554

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T22:00:12Z

Weaknesses