CVE-2026-45331: Open WebUI Vulnerability Exposes Internal Networks
The National Vulnerability Database has detailed CVE-2026-45331, a critical vulnerability in Open WebUI, a self-hosted AI platform. This flaw, present in versions prior to 0.9.0, stems from an inadequate URL validation mechanism in the validate_url() function. Specifically, the validators library’s IPv6 check fails to properly implement the private keyword, leading to all IPv6 addresses bypassing the intended filter. This means internal IPv6 addresses are not correctly blocked.
Further compounding the issue, the vulnerability allows IPv4-mapped IPv6 addresses (e.g., ::ffff:10.0.0.1) to completely bypass IPv4 validation checks. Additionally, several reserved IPv4 ranges, including 0.0.0.0/8, 100.64.0.0/10, and 192.0.0.0/24, are not properly blocked. This combination creates a significant server-side request forgery (SSRF) risk, enabling attackers to access internal network resources or services that should be isolated.
With a CVSS score of 8.5 (HIGH), this vulnerability presents a clear path for an attacker to pivot from the Open WebUI instance into an organization’s internal network. The fix is available in Open WebUI version 0.9.0. Defenders must prioritize patching to mitigate the risk of unauthorized internal access.
What This Means For You
- If your organization uses Open WebUI, this is a direct path for attackers to traverse your internal network. Immediately verify your Open WebUI version. If it's prior to 0.9.0, patch to 0.9.0 or later without delay. Review network logs for any suspicious outbound connections from your Open WebUI instance, especially to internal IP ranges that should not be accessible.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-45331: Open WebUI IPv6 Bypass in URL Validation
title: CVE-2026-45331: Open WebUI IPv6 Bypass in URL Validation
id: scw-2026-05-15-ai-1
status: experimental
level: high
description: |
This rule detects attempts to exploit CVE-2026-45331 by leveraging IPv4-mapped IPv6 addresses to bypass URL validation in Open WebUI. The vulnerability allows attackers to access internal network resources by crafting specific IPv6 addresses that are not properly filtered by the validate_url() function. This detection specifically looks for the '::ffff:' prefix combined with a private IPv4 address range, indicating a potential exploit attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-05-15
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-45331/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '::ffff:'
cs-uri|contains:
- '10.0.0.1'
condition: cs-uri
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45331 | SSRF | Open WebUI versions prior to 0.9.0 |
| CVE-2026-45331 | SSRF | backend/open_webui/retrieval/web/utils.py validate_url() function |
| CVE-2026-45331 | SSRF | IPv6 addresses bypassing validation due to validators.ipv6(ip, private=True) misconfiguration |
| CVE-2026-45331 | SSRF | IPv4-mapped IPv6 (::ffff:10.0.0.1) bypassing IPv4 checks |
| CVE-2026-45331 | SSRF | Reserved IPv4 ranges (0.0.0.0/8, 100.64.0.0/10, 192.0.0.0/24) not blocked |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 15, 2026 at 23:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.