Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user with low privileges can enumerate active background tasks across the system and stop tasks belonging to other users via the GET /api/tasks and POST /api/tasks/stop/{task_id} methods. This allows a casual user to disrupt system-wide chat usage by continuously canceling other users' active tasks. This is a real authorization vulnerability affecting integrity and usability in multi-user deployments. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in Open WebUI allows authenticated users with low privileges to query the list of active background tasks and stop tasks belonging to other users via the GET /api/tasks and POST /api/tasks/stop/{task_id} endpoints. This flaw leads to intentional cancellation of other users’ long‑running tasks, which can be used to shut down system‑wide chat functionality for the entire deployment. The primary impact is a denial of service that harms availability and disrupts the user experience.

Affected Systems

The affected product is the Open WebUI self‑hosted AI platform prior to version 0.9.0. Users running any earlier release of the platform are potentially impacted; the fix is included in 0.9.0 and later releases.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity vulnerability. Since the EPSS score is not available, the precise likelihood of exploitation is unknown, but the vulnerability is considered high risk because any authenticated low‑privileged user can abuse it. No exploit code is publicly known and it is not listed in the CISA KEV catalog, yet the ease of access through a normal user account means that systems without the upgrade are at significant risk of service disruption.

Generated by OpenCVE AI on May 15, 2026 at 20:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Open WebUI to version 0.9.0 or later to resolve the authorization flaw
  • Ensure all authenticated users have appropriate permissions and consider revoking unnecessary low‑privilege accounts
  • Monitor system logs for anomalous task termination activity and review user permissions regularly

Generated by OpenCVE AI on May 15, 2026 at 20:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8jjp-r2w2-4v22 Open WebUI: Low-privilege authenticated users can enumerate and stop global background tasks, causing system-wide chat disruption
History

Fri, 15 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user with low privileges can enumerate active background tasks across the system and stop tasks belonging to other users via the GET /api/tasks and POST /api/tasks/stop/{task_id} methods. This allows a casual user to disrupt system-wide chat usage by continuously canceling other users' active tasks. This is a real authorization vulnerability affecting integrity and usability in multi-user deployments. This vulnerability is fixed in 0.9.0.
Title Open WebUI: Low-privilege authenticated users can enumerate and stop global background tasks, causing system-wide chat disruption
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T19:42:56.786Z

Reserved: 2026-05-12T01:48:40.451Z

Link: CVE-2026-45399

cve-icon Vulnrichment

Updated: 2026-05-15T19:41:11.348Z

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:48.950

Modified: 2026-05-15T20:16:48.950

Link: CVE-2026-45399

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T20:45:08Z

Weaknesses