Authorization Flaw in Open WebUI Allows Unauthorized File Deletion by Users
CVE-2026-45671

8HIGH

Key Information:

Vendor

Open-webui

Vendor
CVE Published:
15 May 2026

What is CVE-2026-45671?

Open WebUI, a self-hosted artificial intelligence platform, has an authorization flaw that allows any authenticated user to permanently delete files owned by other users. This occurs through the DELETE /api/v1/files/{id} endpoint when files are linked in shared chats. The vulnerability arises from a misconfigured authorization gate (has_access_to_file()) that unconditionally permits file access through the shared-chat mechanism without validating the user's identity or the operation type. Moreover, it discloses file UUIDs to any user with read access to a knowledge base via the GET /api/v1/knowledge/{id}/files endpoint, amplifying the security risk. The issue has been resolved in version 0.9.0.

Affected Version(s)

open-webui < 0.9.0

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.