Description
A vulnerability has been found in wandb OpenUI up to 0.0.0.0/1.0. This impacts an unknown function of the file backend/openui/config.py. The manipulation of the argument LITELLM_MASTER_KEY leads to hard-coded credentials. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-28
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Credential Leakage
Action: Assess
AI Analysis

Impact

The vulnerability occurs when the LITELLM_MASTER_KEY argument in wandb OpenUI’s config.py is manipulated, causing the application to store hard‑coded credentials that can be retrieved by a local attacker. This leads to a loss of confidentiality and the potential for local privilege escalation or unauthorized access to the service. The weakness is captured by CWE-259 (Hard‑coded Password) and CWE-798 (Use of Hard‑coded Credentials). The disclosed exploit is available to the public, and the vendor has not addressed it publicly.

Affected Systems

The affected product is wandb OpenUI. Versions up to and including 0.0.0.0/1.0 are impacted. No patch or upgrade path is currently available from the vendor.

Risk and Exploitability

The CVSS score of 4.8 indicates a medium severity problem. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalog. Because the attack requires local access to the machine running the service and the vendor has not released a fix, the risk is limited to environments where the OpenUI component is exposed to potentially compromised local users or processes. The known exploit can be executed without additional external manipulation, and the lack of a remediation reduces the time window for detection to the interval between the disclosure and any future vendor response.

Generated by OpenCVE AI on March 28, 2026 at 10:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the version of wandb OpenUI you are running and confirm if it is within the vulnerable range.
  • If a newer, non‑vulnerable version exists, upgrade the application immediately.
  • If upgrading is not feasible, restrict local access to the OpenUI service through firewall rules, network segmentation, or container isolation so that only trusted hosts can reach it.
  • Monitor authentication logs for unusual credential usage or repeated access attempts that may indicate exploitation.
  • Contact wandb support to request an official patch or further guidance on mitigations.

Generated by OpenCVE AI on March 28, 2026 at 10:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in wandb OpenUI up to 0.0.0.0/1.0. This impacts an unknown function of the file backend/openui/config.py. The manipulation of the argument LITELLM_MASTER_KEY leads to hard-coded credentials. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title wandb OpenUI config.py hard-coded credentials
Weaknesses CWE-259
CWE-798
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-28T09:15:09.765Z

Reserved: 2026-03-27T13:47:57.347Z

Link: CVE-2026-4993

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-28T10:16:31.853

Modified: 2026-03-28T10:16:31.853

Link: CVE-2026-4993

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:32:39Z

Weaknesses