| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-6832 | Nesquena Hermes WebUI Arbitrary File Deletion via Unvalidated session_id | nesquena | hermes-webui | High | 8.1 | 2026-04-21 21:44:55 | Deep Dive |
| CVE-2026-6830 | Nesquena Hermes WebUI Environment Variable Credential Leakage via Profile Switch | nesquena | hermes-webui | Low | 3.3 | 2026-04-21 21:33:29 | Deep Dive |
| CVE-2026-6829 | nesquena hermes-webui Arbitrary Workspace Directory Access | nesquena | hermes-webui | Medium | 6.3 | 2026-04-21 21:10:00 | Deep Dive |
| CVE-2026-34225 | Open WebUI has Blind Server Side Request Forgery in its Image Edit Functionality | open-webui | open-webui | Medium | 4.3 | 2026-04-14 01:39:07 | Deep Dive |
| CVE-2026-35487 | text-generation-webui has a Path Traversal in load_prompt() — .txt file read without authentication | oobabooga | text-generation-webui | Medium | 5.3 | 2026-04-07 14:50:25 | Deep Dive |
| CVE-2026-35486 | text-generation-webui has a SSRF in superbooga/superboogav2 extensions — no URL validation | oobabooga | text-generation-webui | High | 7.5 | 2026-04-07 14:49:38 | Deep Dive |
| CVE-2026-35485 | text-generation-webui has a Path Traversal in load_grammar() — arbitrary file read without authentication | oobabooga | text-generation-webui | High | 7.5 | 2026-04-07 14:47:38 | Deep Dive |
| CVE-2026-35484 | text-generation-webui has a Path Traversal in load_preset() — .yaml file read without authentication | oobabooga | text-generation-webui | Medium | 5.3 | 2026-04-07 14:46:42 | Deep Dive |
| CVE-2026-35483 | text-generation-webui has a Path Traversal in load_template() — .jinja/.yaml/.yml file read without authentication | oobabooga | text-generation-webui | Medium | 5.3 | 2026-04-07 14:45:07 | Deep Dive |
| CVE-2026-35050 | text-generation-webui affected by Remote Code Execution (RCE) through Path Traversal at "Session -> Save extention settings to user_data/settings.yaml". | oobabooga | text-generation-webui | Critical | 9.1 | 2026-04-06 17:30:21 | Deep Dive |
| CVE-2026-34222 | Open WebUI has Broken Access Control in Tool Valves | open-webui | open-webui | High | 7.7 | 2026-04-01 17:02:22 | Deep Dive |
| CVE-2026-29071 | Open WebUI's Insecure Direct Object Reference (IDOR) allows access to other users' memories | open-webui | open-webui | Low | 3.1 | 2026-03-26 23:54:38 | Deep Dive |
| CVE-2026-29070 | Open WebUI has unauthorized deletion of knowledge files | open-webui | open-webui | Medium | 5.4 | 2026-03-26 23:39:33 | Deep Dive |
| CVE-2026-28788 | Open WebUI's process_files_batch() endpoint missing ownership check, allows unauthorized file overwrite | open-webui | open-webui | High | 7.1 | 2026-03-26 23:38:21 | Deep Dive |
| CVE-2026-28786 | Open WebUI vulnerable to Path Traversal in `POST /api/v1/audio/transcriptions` | open-webui | open-webui | Medium | 4.3 | 2026-03-26 23:37:26 | Deep Dive |
| CVE-2026-33340 | LoLLMs WEBUI has unauthenticated Server-Side Request Forgery (SSRF) in /api/proxy endpoint | ParisNeo | lollms-webui | Critical | 9.1 | 2026-03-24 15:58:36 | Deep Dive |
| CVE-2025-15603 | open-webui JWT Key start_windows.bat random values | - | open-webui | Low | 3.7 | 2026-03-09 20:32:06 | Deep Dive |
| CVE-2026-26193 | Open WebUI vulnerable to Stored XSS via iFrame embeds in response messages | open-webui | open-webui | High | 7.3 | 2026-02-19 19:15:03 | Deep Dive |
| CVE-2026-26192 | Open WebUI vulnerable to Stored XSS via iFrame in citations model | open-webui | open-webui | High | 7.3 | 2026-02-19 19:10:52 | Deep Dive |
| CVE-2024-2356 | Remote Code Execution due to LFI in '/reinstall_extension' in parisneo/lollms-webui | parisneo | parisneo/lollms-webui | - | - | 2026-02-02 10:36:24 | Deep Dive |