Session Management Flaw in Open WebUI Affects Administrative Controls
CVE-2026-44553

8.1HIGH

Key Information:

Vendor

Open-webui

Vendor
CVE Published:
15 May 2026

What is CVE-2026-44553?

The Open WebUI platform, designed for offline operation, has a session management flaw affecting role changes and user deletions. Specifically, prior to version 0.9.0, when an administrator's role is revoked or a user is deleted, existing sessions remain active due to failure to clear the SESSION_POOL. This oversight allows users to retain admin privileges in their Socket.IO sessions as long as they maintain their connection. The vulnerability is acknowledged and addressed in version 0.9.0, enhancing the security of role management and session integrity.

Affected Version(s)

open-webui < 0.9.0

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.