目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2026-45671— Open WebUI shared-chat 分支权限绕过致未授权文件删除

CVSS 8.0 · High
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2026-45671の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Open WebUI: shared-chat branch ignores access_type, allowing unauthorized file deletion
ソース: NVD (National Vulnerability Database)
脆弱性説明
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is referenced in any shared chat. The has_access_to_file() authorization gate unconditionally grants access through its shared-chat branch. It checks neither the requesting user's identity nor the type of operation being performed. File UUIDs (which would otherwise be impractical to guess) are disclosed to any user with read access to a knowledge base via GET /api/v1/knowledge/{id}/files. This vulnerability is fixed in 0.9.0.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
通过用户控制密钥绕过授权机制
ソース: NVD (National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
open-webuiopen-webui < 0.9.0 -

II. CVE-2026-45671の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2026-45671のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · open-webui · 2026-05-15 · 59 CVEs total

CVE-2026-445519.1 CRITICALOpen WebUI: LDAP Empty Password Authentication Bypass
CVE-2026-456728.8 HIGHOpen WebUI: Jupyter code execution works despite `ENABLE_CODE_EXECUTION=false` — feature g
CVE-2026-453158.7 HIGHOpen WebUI: Stored XSS via attacker-controlled file extension in /api/v1/audio/transcripti
CVE-2026-445528.7 HIGHOpen WebUI: Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Ena
CVE-2026-453318.5 HIGHOpen WebUI: Full SSRF Vulnerability in the RAG Web Search Feature
CVE-2026-454008.5 HIGHOpen WebUI: Server-Side Request Forgery (SSRF) bypass in `validate_url`
CVE-2026-454018.5 HIGHOpen WebUI: SSRF Bypass via HTTP Redirect Following in Web-Fetch and Image-Load Endpoints
CVE-2026-445708.3 HIGHOpen WebUI: Inconsistent authorization controls within memories API
CVE-2026-445658.1 HIGHOpen WebUI: Open WebUI Arbitrary File Write, Delete via Path Traversal
CVE-2026-445538.1 HIGHOpen WebUI: Stale Admin Role in Socket.IO Session Pool Enables Post-Demotion Cross-User No
CVE-2026-456758.1 HIGHOpen WebUI: LDAP and OAuth First-User Race Condition Allows Multiple Admin Accounts
CVE-2026-445548.1 HIGHOpen WebUI: Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overw
CVE-2026-453018.1 HIGHOpen WebUI: Missing permission check in files API allows authenticated users to list, acce
CVE-2026-456658.1 HIGHOpen WebUI: Stored XSS in Banner Component via Improper Sanitization Order
CVE-2026-454028.1 HIGHOpen WebUI: Cross-User File Access via Unchecked file_id in Folder Knowledge and Knowledge
CVE-2026-453387.7 HIGHOpen WebUI: SSRF via OAuth Profile Picture URL in _process_picture_url (oauth.py)
CVE-2026-453037.7 HIGHOpen WebUI: Stored XSS via the HTML renedering view
CVE-2026-445557.6 HIGHOpen WebUI: Base Model Routing Bypasses Access Control via Model Chaining
CVE-2026-453987.5 HIGHOpen WebUI: IDOR - Retrieval API Bypasses Knowledge Base Access Controls
CVE-2026-445677.3 HIGHOpen WebUI: Open WebUI Improper Authorization Control

Showing 20 of 59 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2026-45671へのコメント

まだコメントはありません


コメントを残す