Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338). The function fetches arbitrary URLs from OAuth picture claims without applying validate_url(), allowing an attacker to force the server to make HTTP requests to internal resources and exfiltrate the full response. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability lies in the backend function that processes OAuth profile picture URLs. It unconditionally fetches the image from any URL declared in the OAuth provider’s picture claim. Because no validation or whitelisting is performed, an attacker can supply a forged claim pointing to an internal endpoint, forcing the Open WebUI server to make an HTTP request to that endpoint and retrieve the entire response, thus exfiltrating internal data. Open WebUI is a self‑hosted artificial intelligence platform that can run offline, yet this SSRF flaw allows externally supplied tokens to induce network calls to internal resources. The flaw is corrected in Open WebUI 0.9.0, after which the insecure URL fetching is removed.

Affected Systems

Open WebUI, versions prior to 0.9.0, hosted on any platform where the backend runs the open_webui/utils/oauth.py module. The software is self‑hosted and designed to operate offline, but the flaw still allows remote users to trigger SSRF via the OAuth flow in affected installations.

Risk and Exploitability

The CVSS score of 7.7 reflects a medium‑to‑high severity vulnerability; the EPSS score is not available, so the current exploitation probability cannot be quantified, but the lack of mitigation indicates potential usage. The flaw is not listed in the CISA KEV catalog, suggesting no publicly documented active exploitation. Based on the description, it is inferred that an attacker can exploit the SSRF by simply authenticating through the OAuth provider and tampering with the picture URL claim in the token, which is generally possible if the provider allows configuration of the claim. The impact includes internal data exfiltration and potential compromise of internal services, making it critical to remediate promptly.

Generated by OpenCVE AI on May 15, 2026 at 23:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open WebUI to version 0.9.0 or later; this update removes the insecure URL fetching code and mitigates the SSRF vulnerability.
  • If an upgrade cannot be applied immediately, restrict outbound traffic from the Open WebUI service by firewall or proxy restrictions so that it cannot reach internal network ranges, thereby limiting the scope of potential SSRF exploitation.
  • Disable or restrict the fetching of OAuth profile pictures in the OAuth configuration if the feature is not required, ensuring that no external URLs are processed by the backend.

Generated by OpenCVE AI on May 15, 2026 at 23:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-24c9-2m8q-qhmh Open WebUI Vulnerable to SSRF via OAuth Profile Picture URL in _process_picture_url (oauth.py)
History

Fri, 15 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 22:00:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338). The function fetches arbitrary URLs from OAuth picture claims without applying validate_url(), allowing an attacker to force the server to make HTTP requests to internal resources and exfiltrate the full response. This vulnerability is fixed in 0.9.0.
Title Open WebUI: SSRF via OAuth Profile Picture URL in _process_picture_url (oauth.py)
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T22:21:22.453Z

Reserved: 2026-05-11T21:40:08.176Z

Link: CVE-2026-45338

cve-icon Vulnrichment

Updated: 2026-05-15T22:20:41.607Z

cve-icon NVD

Status : Received

Published: 2026-05-15T22:16:54.790

Modified: 2026-05-15T23:16:21.180

Link: CVE-2026-45338

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T00:00:12Z

Weaknesses