Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in 0.9.5.
Published: 2026-05-15
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a server‑side request forgery bypass triggered by a parsing inconsistency between the urlparse module and the requests library. This flaw forces the application to inadvertently send outbound HTTP requests to arbitrary hosts when validating user‑supplied URLs, enabling attackers to reach internal or restricted services. The weakness directly maps to CWE‑918 and can compromise confidentiality and availability of internal resources, but it does not allow code execution on the host. The CVSS score of 8.5 reflects a high risk for adversaries who can supply a crafted URL.

Affected Systems

The affected vendor is Open WebUI, the product name is also Open WebUI, and all versions prior to 0.9.5 are vulnerable. The platform is a self‑hosted artificial intelligence application that operates offline, so the threat surface includes local network resources accessed by the container or host environment.

Risk and Exploitability

Because the flaw is triggered by user input that is validated by the application's URL parser, an attacker can simply provide a specially crafted address to the validate_url endpoint. The exploit does not require additional privileges, and there are no known mitigations beyond patching. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, though the high severity indicates that exploitation is plausible if an attacker can interact with the endpoint. The risk is elevated for environments that expose Open WebUI to untrusted input or the internet.

Generated by OpenCVE AI on May 15, 2026 at 22:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open WebUI to version 0.9.5 or later, which removes the parsing inconsistency that permits SSRF.
  • Configure network segmentation or firewall rules to restrict outbound connections from the Open WebUI container or host to only trusted endpoints.
  • Validate all external URLs against an allow‑list or deny‑list of trusted domains before passing them to third‑party libraries, ensuring that internal or privileged URLs cannot be requested by users.

Generated by OpenCVE AI on May 15, 2026 at 22:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8w7q-q5jp-jvgx Open WebUI has a Server-Side Request Forgery (SSRF) bypass in `validate_url`
History

Fri, 15 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 21:00:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in 0.9.5.
Title Open WebUI: Server-Side Request Forgery (SSRF) bypass in `validate_url`
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T21:07:50.884Z

Reserved: 2026-05-12T01:48:40.451Z

Link: CVE-2026-45400

cve-icon Vulnrichment

Updated: 2026-05-15T21:07:40.929Z

cve-icon NVD

Status : Received

Published: 2026-05-15T21:16:38.003

Modified: 2026-05-15T22:16:55.820

Link: CVE-2026-45400

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T22:30:06Z

Weaknesses