Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.11, an internal-only bypass_filter parameter is exposed on the /openai/chat/completions and /ollama/api/chat HTTP endpoints via FastAPI query string binding, allowing any authenticated user to append ?bypass_filter=true and bypass model access control checks to invoke admin-restricted models. This vulnerability is fixed in 0.8.11.
Published: 2026-05-15
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an access‑control flaw that allows an authenticated user of Open WebUI to append the query string parameter ?bypass_filter=true to certain HTTP endpoints, circumventing the internal model‑access restrictions. This bypass is possible on the /openai/chat/completions and /ollama/api/chat routes before version 0.8.11. The effect is that a non‑admin user can invoke admin‑only models, potentially exposing business data or consuming privileged resources without authorization. The flaw is mapped to CWE‑285, which describes unauthorized privilege escalation via bypassed access controls.

Affected Systems

The affected product is Open WebUI from the open‑webui project, specifically versions released earlier than 0.8.11. Versions 0.8.10 and prior expose the bypass_filter query parameter on the relevant API endpoints. The vulnerability does not affect later releases that have removed the parameter from the public API.

Risk and Exploitability

The CVSS base score of 5.4 indicates a moderate severity. There is no EPSS data, so the likelihood of exploitation cannot be quantified, but because the flaw requires authenticated access and is only relevant to systems that expose the old API paths, the practical risk is limited to hosts running an insecure version of Open WebUI. The issue is not listed in CISA's KEV catalog, and no exploit is publicly available. Attackers would likely need to compromise valid user credentials or use brand‑new accounts to supply the bypass parameter, which suggests the threat environment is moderate, with the likely attack vector being an authenticated HTTP request to the affected endpoints.

Generated by OpenCVE AI on May 15, 2026 at 22:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open WebUI to version 0.8.11 or later, which removes the exposed bypass_filter query parameter.
  • Implement role‑based access controls to restrict non‑admin users from accessing admin‑only models, and monitor model‑usage logs for suspicious activity.
  • Configure an API gateway or reverse‑proxy to block the bypass_filter query parameter on the /openai/chat/completions and /ollama/api/chat endpoints for non‑admin users, ensuring the parameter cannot be used to bypass model‑access restrictions.

Generated by OpenCVE AI on May 15, 2026 at 22:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v6qf-75pr-p96m Open WebUI: Authenticated users can bypass model access control via exposed query parameter [AI-ASSISTED]
History

Fri, 15 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.11, an internal-only bypass_filter parameter is exposed on the /openai/chat/completions and /ollama/api/chat HTTP endpoints via FastAPI query string binding, allowing any authenticated user to append ?bypass_filter=true and bypass model access control checks to invoke admin-restricted models. This vulnerability is fixed in 0.8.11.
Title Open WebUI: Authenticated users can bypass model access control via exposed query parameter
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T21:07:12.449Z

Reserved: 2026-05-12T00:51:29.085Z

Link: CVE-2026-45365

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T22:16:55.590

Modified: 2026-05-15T22:16:55.590

Link: CVE-2026-45365

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T23:00:14Z

Weaknesses