IPv6 Validation Bypass in Open WebUI AI Platform
CVE-2026-45331

8.5HIGH

Key Information:

Vendor

Open-webui

Vendor
CVE Published:
15 May 2026

What is CVE-2026-45331?

The Open WebUI, a self-hosted AI platform, contains a vulnerability in its IPv6 address validation process. In versions prior to 0.9.0, the validate_url() function incorrectly allows all IPv6 addresses to bypass filtering due to a flaw in the usage of the private keyword in the validators library. This misconfiguration results in validation errors being overlooked, enabling IPv4-mapped IPv6 addresses as well as certain reserved IPv4 ranges to evade checks. Consequently, this poses a potential risk for unauthorized access and could lead to security breaches.

Affected Version(s)

open-webui < 0.9.0

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.