Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitized. This allows for users to upload files with names containing dot-segments in the file path and traverse out of the intended uploads directory. Effectively, users can upload files anywhere on the filesystem the user running the web server has permission. This vulnerability is fixed in 0.6.10.
Published: 2026-05-15
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open WebUI allows an attacker to write or delete arbitrary files through a path traversal vulnerability that is triggered when uploading an audio file. The file name is taken directly from the HTTP request without validation or sanitization, enabling a malicious user to embed dot segments in the file path and navigate outside the intended uploads directory. This flaw can be exploited to create or overwrite files anywhere on the file system that the web server process can write to, potentially compromising confidentiality, integrity, or availability. The weakness is a classic pathname traversal flaw classified as CWE-22.

Affected Systems

The vendor is open-webui and the affected product is the self‑hosted AI platform itself. Versions prior to 0.6.10 are impacted, including all 0.5.x releases and 0.6.0 through 0.6.9. The issue is resolved in 0.6.10 and later releases.

Risk and Exploitability

The CVSS score for this vulnerability is 8.1, indicating a high severity level. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that exploitation data is sparse or non‑public. The attack vector is inferred to be via the web upload interface; an attacker who can submit an audio file—either by having a user account or through a public upload endpoint—can exploit the flaw. The exploitation requires only file system write permissions granted to the web server user, so local privilege is sufficient once the web server can be reached.

Generated by OpenCVE AI on May 15, 2026 at 23:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Open WebUI instance to version 0.6.10 or later, which removes the vulnerability by sanitizing upload filenames
  • Configure the web server or application to restrict the upload directory to a dedicated, non‑privileged path and enforce strict filename validation that disallows path traversal characters
  • Run the Open WebUI process with the least privileges necessary, such as non‑root user and sandboxed filesystem containers, to limit the impact of any potential file system exploitation

Generated by OpenCVE AI on May 15, 2026 at 23:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j3fw-wc48-29g3 Open WebUI Arbitrary File Write, Delete via Path Traversal
History

Fri, 15 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 22:00:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitized. This allows for users to upload files with names containing dot-segments in the file path and traverse out of the intended uploads directory. Effectively, users can upload files anywhere on the filesystem the user running the web server has permission. This vulnerability is fixed in 0.6.10.
Title Open WebUI: Open WebUI Arbitrary File Write, Delete via Path Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T21:40:50.712Z

Reserved: 2026-05-06T20:59:00.595Z

Link: CVE-2026-44565

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T22:16:52.780

Modified: 2026-05-15T22:16:52.780

Link: CVE-2026-44565

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T00:00:12Z

Weaknesses