Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing base model (e.g., "gpt-4-turbo-restricted") that provides the actual inference capability. When a user queries the composed model, the access control pipeline verifies the user has access to the composed model but never re-verifies access to the chained base model. Additionally, the model creation and import endpoints accept arbitrary base_model_id values without checking that the caller has access to that base model. Combined, this allows any user with the default model creation permission to create a model that chains to a restricted base model — and then invoke it, causing the server to dispatch the request to the restricted base model using the admin-configured API key. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from Open WebUI’s model composition feature, where a composed model can invoke a base model specified by base_model_id. The access control logic only verifies permission for the composed model and never checks the base model’s access control. Furthermore, the API that creates and imports models accepts any base_model_id regardless of the caller’s rights. An attacker with the default permission to create models can therefore create a composed model that points to a restricted base model. When the composed model is queried, the server forwards the request to the restricted base model using the admin‑configured API key, effectively leaking that key and allowing the attacker to use restricted models without authorization. This results in a privilege escalation and unauthorized use of confidential or paid baseline models.

Affected Systems

All releases of Open WebUI prior to version 0.9.0 are affected. The issue is specific to the open-webui:open-webui product and applies to any installation that enables model composition with base_model_id, particularly those that provide default model‑creation permissions to non‑admin users.

Risk and Exploitability

The CVSS score of 7.6 indicates a high severity vulnerability. Exploitation requires only that the attacker possesses the default capability to create models; no additional credentials or external access are needed. Once a malicious composed model is created, each invocation uses the server’s privileged API key, giving the attacker functional access to the restricted base model. Although the EPSS score is not provided, the vulnerability has not yet appeared in the CISA KEV catalog, suggesting limited exploitation in the wild so far. Nevertheless, the presence of an API key in transit and the potential to generate additional expensive queries warrants timely mitigation.

Generated by OpenCVE AI on May 15, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open WebUI to version 0.9.0 or later, where the bug is fixed.
  • Remove or restrict the ability for non‑admin users to create or import new models; limit model‑creation permissions to trusted administrators only.
  • Validate the base_model_id supplied at model creation time against the user’s permissions; enforce that a user can only reference base models they are authorized to use.

Generated by OpenCVE AI on May 15, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9vvh-qmjx-p4q8 Open WebUI's Base Model Routing Bypasses Access Control via Model Chaining
History

Fri, 15 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing base model (e.g., "gpt-4-turbo-restricted") that provides the actual inference capability. When a user queries the composed model, the access control pipeline verifies the user has access to the composed model but never re-verifies access to the chained base model. Additionally, the model creation and import endpoints accept arbitrary base_model_id values without checking that the caller has access to that base model. Combined, this allows any user with the default model creation permission to create a model that chains to a restricted base model — and then invoke it, causing the server to dispatch the request to the restricted base model using the admin-configured API key. This vulnerability is fixed in 0.9.0.
Title Open WebUI: Base Model Routing Bypasses Access Control via Model Chaining
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T20:21:22.063Z

Reserved: 2026-05-06T20:59:00.594Z

Link: CVE-2026-44555

cve-icon Vulnrichment

Updated: 2026-05-15T20:21:17.218Z

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:46.967

Modified: 2026-05-15T21:16:35.913

Link: CVE-2026-44555

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T21:30:08Z

Weaknesses