Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is referenced in any shared chat. The has_access_to_file() authorization gate unconditionally grants access through its shared-chat branch. It checks neither the requesting user's identity nor the type of operation being performed. File UUIDs (which would otherwise be impractical to guess) are disclosed to any user with read access to a knowledge base via GET /api/v1/knowledge/{id}/files. This vulnerability is fixed in 0.9.0.
Published: 2026-05-15
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open WebUI versions prior to 0.9.0 allow any authenticated user to permanently delete files belonging to other users via the DELETE /api/v1/files/{id} endpoint when the target file is part of a shared chat. The authorization gate has_access_to_file() mistakenly grants delete access through its shared-chat branch without checking the requester’s identity or the operation type, thereby enabling a user to delete arbitrary files. This flaw is an example of CWE‑639, where authorization is bypassed due to insufficient ownership checks.

Affected Systems

The affected product is the open-webui:open-webui platform. Any deployment running a version earlier than 0.9.0 is vulnerable, as the fix was introduced in the 0.9.0 release. No specific sub‑versions are explicitly listed in the advisory.

Risk and Exploitability

The CVSS score of 8 indicates high severity. The EPSS score is not available, but the vulnerability is not listed in the CISA KEV catalog. The attack requires the attacker to be an authenticated user and to have obtained the UUID of a target file, which can be learned by reading knowledge base files via GET /api/v1/knowledge/{id}/files. An attacker with read access to any knowledge base can thus identify file IDs and invoke the delete endpoint to remove files owned by other users. Once the delete request is authorized by the faulty gate, the target file is permanently removed. The lack of an access check on operation type ensures that the deletion is possible even for non‑owner users, making the vulnerability highly exploitable in multi‑user deployments.

Generated by OpenCVE AI on May 15, 2026 at 20:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open WebUI to version 0.9.0 or later, which corrects the authorization gate.
  • If an upgrade cannot be performed immediately, tightly restrict read access to knowledge bases, ensuring that only trusted users can view file UUIDs.
  • Revoke shared‑chat functionality or implement an explicit ownership check before allowing DELETE /api/v1/files/{id} requests to prevent unauthorized deletions.

Generated by OpenCVE AI on May 15, 2026 at 20:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-26g9-27vm-x3q8 Open WebUI: shared-chat branch ignores access_type, allowing unauthorized file deletion
History

Fri, 15 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Open-webui
Open-webui open-webui
Vendors & Products Open-webui
Open-webui open-webui

Fri, 15 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is referenced in any shared chat. The has_access_to_file() authorization gate unconditionally grants access through its shared-chat branch. It checks neither the requesting user's identity nor the type of operation being performed. File UUIDs (which would otherwise be impractical to guess) are disclosed to any user with read access to a knowledge base via GET /api/v1/knowledge/{id}/files. This vulnerability is fixed in 0.9.0.
Title Open WebUI: shared-chat branch ignores access_type, allowing unauthorized file deletion
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Open-webui Open-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T21:11:06.518Z

Reserved: 2026-05-12T21:59:25.666Z

Link: CVE-2026-45671

cve-icon Vulnrichment

Updated: 2026-05-15T21:10:57.170Z

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:49.090

Modified: 2026-05-15T22:16:56.327

Link: CVE-2026-45671

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T20:45:08Z

Weaknesses