Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does NOT implement the private keyword for IPv6 — the call raises a ValidationError (which is falsy in a boolean context), so every IPv6 address passes the filter. In addition, IPv4-mapped IPv6 (::ffff:10.0.0.1) bypasses the IPv4 check entirely, and several reserved IPv4 ranges (0.0.0.0/8, 100.64.0.0/10, 192.0.0.0/24, etc.) are not blocked. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open WebUI, a self‑hosted offline AI platform, has a full Server‑Side Request Forgery flaw in its Retrieval‑Augmented Generation search function. The bug stems from the validate_url function, which incorrectly permits IPv6 addresses as valid because the validators library ignores the private flag. This oversight also allows IPv4‑mapped IPv6 addresses to bypass IPv4 checks, and reserved IPv4 ranges are not blocked, enabling an attacker to craft search queries that request arbitrary internal network resources. The flaw can lead to disclosure of internal data, lateral movement, or potentially further exploitation depending on the internal services accessed.

Affected Systems

Any deployment of open‑webui using the open‑webui product before version 0.9.0 is vulnerable. The issue exists in all previous releases of the platform regardless of hosting environment and is documented in the open‑webui codebase. In particular, the backend module open_webui/retrieval/web/utils.py contains the faulty validate_url logic. There are no other vendors or products listed as affected.

Risk and Exploitability

The CVSS base score of 8.5 indicates a high severity vulnerability. EPSS data is not available, and the flaw is not listed in the CISA KEV catalog, which suggests a moderate exploitation likelihood at present, though the full SSRF capability represents an attractive target for attackers with access to the RAG search interface. Attackers can exploit the flaw by submitting malicious URLs via the web search feature, directing the server to internal services that it would otherwise be unable to reach. Based on the description, it is inferred that no authentication is required to exploit this vulnerability, as the ability to submit search queries is needed but no privilege escalation or authentication prerequisite is documented.

Generated by OpenCVE AI on May 15, 2026 at 21:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to open‑webui version 0.9.0 or later where the validate_url bug is fixed.
  • If an upgrade is not immediately possible, disable the Retrieval‑Augmented Generation web search capability to prevent malformed URLs from being processed.
  • Alternatively, constrain outbound requests by applying an IP or domain whitelist so only approved locations can be queried through the web UI.

Generated by OpenCVE AI on May 15, 2026 at 21:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4v7r-f4w8-8972 Open WebUI has a full SSRF Vulnerability in the RAG Web Search Feature
History

Fri, 15 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does NOT implement the private keyword for IPv6 — the call raises a ValidationError (which is falsy in a boolean context), so every IPv6 address passes the filter. In addition, IPv4-mapped IPv6 (::ffff:10.0.0.1) bypasses the IPv4 check entirely, and several reserved IPv4 ranges (0.0.0.0/8, 100.64.0.0/10, 192.0.0.0/24, etc.) are not blocked. This vulnerability is fixed in 0.9.0.
Title Open WebUI: Full SSRF Vulnerability in the RAG Web Search Feature
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T22:21:52.962Z

Reserved: 2026-05-11T20:50:30.540Z

Link: CVE-2026-45331

cve-icon Vulnrichment

Updated: 2026-05-15T22:14:11.067Z

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:48.563

Modified: 2026-05-15T23:16:21.073

Link: CVE-2026-45331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T21:45:09Z

Weaknesses