Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI allows admins to restrict which API endpoints an API key can access. When an API key is restricted from /api/v1/messages, requests using the Authorization: Bearer sk-... header are correctly blocked with 403. However, the same key sent via the x-api-key header bypasses the restriction entirely — the request is authenticated, the model is invoked, and a full response is returned. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open WebUI allowed administrators to lock down specific API endpoints for an API key, but the same key sent in an x‑api‑key header bypassed those restrictions. The key was authenticated, the model executed, and the full response was returned, granting the attacker unauthorised access to the /api/v1/messages endpoint. This weakness is an authorization bypass (CWE‑863) that can compromise the intended limitation of the platform.

Affected Systems

All self‑hosted Open WebUI installations running a version earlier than 0.9.0 are vulnerable. Admins who have restricted API keys for the /api/v1/messages endpoint will find those restrictions ineffective when the key is provided via the x‑api‑key header.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate risk. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that it has not been widely exploited publicly yet. The likely attack vector involves an authenticated user who can supply an x‑api‑key header; if the service is exposed to the internet, an external attacker could send such requests directly, but this is inferred from the description and not explicitly stated in the advisory.

Generated by OpenCVE AI on May 15, 2026 at 20:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Open WebUI 0.9.0 or later, which restores enforcement of endpoint restrictions for x‑api‑key headers.
  • If an upgrade is not yet possible, configure the platform or network firewall to block or reject requests that include an x‑api‑key header for restricted endpoints.
  • Consider disabling the x‑api‑key header entirely or enforcing stricter authentication checks on the /api/v1/messages endpoint to maintain the intended authorization policy.

Generated by OpenCVE AI on May 15, 2026 at 20:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-57q6-fvp4-pqmm Open WebUI's API key endpoint restrictions bypassed via `x-api-key` header — full message processing on restricted endpoints
History

Fri, 15 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI allows admins to restrict which API endpoints an API key can access. When an API key is restricted from /api/v1/messages, requests using the Authorization: Bearer sk-... header are correctly blocked with 403. However, the same key sent via the x-api-key header bypasses the restriction entirely — the request is authenticated, the model is invoked, and a full response is returned. This vulnerability is fixed in 0.9.0.
Title Open WebUI: API key endpoint restrictions bypassed via `x-api-key` header — full message processing on restricted endpoints
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T19:21:26.401Z

Reserved: 2026-05-11T21:40:08.176Z

Link: CVE-2026-45339

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:48.693

Modified: 2026-05-15T20:16:48.693

Link: CVE-2026-45339

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T20:45:08Z

Weaknesses