Open WebUI Vulnerability Exposes All User Files
The National Vulnerability Database has detailed CVE-2026-45301, a critical missing permission check in Open WebUI, a self-hosted AI platform. This flaw, present in versions prior to 0.3.16, allows any authenticated user to list, access, and delete files uploaded by any other user on the platform. This isn’t just a disclosure; it’s a full compromise of data integrity and confidentiality across the entire instance.
The vulnerability stems from a fundamental breakdown in authorization logic within all file-related API endpoints. An attacker doesn’t need elevated privileges; standard authenticated access is sufficient. This significantly broadens the attack surface, making exploitation trivial for anyone with a valid login. The CVSS score of 8.1 (HIGH) reflects the high impact on confidentiality and integrity, with low attack complexity and required privileges.
Open WebUI instances are designed to operate offline, often handling sensitive internal data or proprietary models. This vulnerability means that internal users, even those with limited roles, could exfiltrate or tamper with critical data. The fix is in version 0.3.16; organizations running this platform must prioritize immediate patching to prevent unauthorized data access and deletion.
What This Means For You
- If your organization uses Open WebUI, you must patch to version 0.3.16 immediately. This isn't a theoretical risk; it's a direct path for any authenticated user to access and delete *all* files uploaded by *any* other user. Audit your logs for unusual file access patterns or deletions, especially if patching hasn't been completed.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Open WebUI Unauthorized File Access - CVE-2026-45301
title: Open WebUI Unauthorized File Access - CVE-2026-45301
id: scw-2026-05-15-ai-1
status: experimental
level: critical
description: |
Detects attempts to access, list, or delete files via the /api/files/ endpoints in Open WebUI versions prior to 0.3.16. This indicates exploitation of CVE-2026-45301, where authenticated users can access all files uploaded by any user due to a missing permission check.
author: SCW Feed Engine (AI-generated)
date: 2026-05-15
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-45301/
tags:
- attack.privilege_escalation
- attack.t1110.001
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/files/'
cs-method:
- 'GET'
- 'POST'
- 'DELETE'
sc-status:
- '200'
- '201'
- '204'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45301 | Auth Bypass | Open WebUI versions prior to 0.3.16 |
| CVE-2026-45301 | Information Disclosure | Open WebUI versions prior to 0.3.16, missing permission check in file related API endpoints |
| CVE-2026-45301 | Privilege Escalation | Open WebUI versions prior to 0.3.16, allows authenticated users to list, access, and delete files uploaded by other users |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 16, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.