Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the AccountPending.svelte component renders the admin-configured "Pending User Overlay Content" using marked.parse() inside {@html} with an incorrect DOMPurify application order. An admin can inject arbitrary JavaScript into the Pending User Overlay Content that executes in the browser context of any pending user who views the overlay page. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open WebUI’s AccountPending.svelte component incorrectly applies DOMPurify after converting user‑configurable "Pending User Overlay Content" with marked.parse() and inserting it into the page with {@html}. This ordering flaw allows an administrator to persist malicious JavaScript that executes in the browser context of any pending user who visits the overlay page. The injected code runs with the user's privileges but does not provide server‑side code execution or persistence beyond the browser.

Affected Systems

The vulnerability is present in open‑webui platform releases earlier than 0.9.0. All users running any 0.x version before this update are affected.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate risk. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an administrator to inject malicious content into the overlay configuration; after that, any pending user who views the overlay can be compromised through client‑side code execution.

Generated by OpenCVE AI on May 15, 2026 at 21:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade open‑webui to version 0.9.0 or later, which applies DOMPurify correctly
  • If upgrade cannot be performed immediately, disable the Pending User Overlay feature or delete its content to eliminate the injection surface
  • Restrict administrator privileges and enforce strong input validation or sanitization for any future configuration of overlay content

Generated by OpenCVE AI on May 15, 2026 at 21:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fq3v-xjjx-95rc Open WebUI has Stored XSS in Pending User Overlay via Incorrect DOMPurify Application Order
History

Fri, 15 May 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the AccountPending.svelte component renders the admin-configured "Pending User Overlay Content" using marked.parse() inside {@html} with an incorrect DOMPurify application order. An admin can inject arbitrary JavaScript into the Pending User Overlay Content that executes in the browser context of any pending user who views the overlay page. This vulnerability is fixed in 0.9.0.
Title Open WebUI: Stored XSS in Pending User Overlay via Incorrect DOMPurify Application Order
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T20:19:00.400Z

Reserved: 2026-05-06T20:59:00.595Z

Link: CVE-2026-44568

cve-icon Vulnrichment

Updated: 2026-05-15T20:18:55.588Z

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:48.263

Modified: 2026-05-15T21:16:36.277

Link: CVE-2026-44568

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T21:15:08Z

Weaknesses