Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j3fw-wc48-29g3 | Open WebUI Arbitrary File Write, Delete via Path Traversal |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openwebui
Openwebui open Webui |
|
| CPEs | cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openwebui
Openwebui open Webui |
Mon, 18 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-webui
Open-webui open-webui |
|
| Vendors & Products |
Open-webui
Open-webui open-webui |
Fri, 15 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitized. This allows for users to upload files with names containing dot-segments in the file path and traverse out of the intended uploads directory. Effectively, users can upload files anywhere on the filesystem the user running the web server has permission. This vulnerability is fixed in 0.6.10. | |
| Title | Open WebUI: Open WebUI Arbitrary File Write, Delete via Path Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-18T12:53:03.127Z
Reserved: 2026-05-06T20:59:00.595Z
Link: CVE-2026-44565
Updated: 2026-05-18T12:52:57.228Z
Status : Analyzed
Published: 2026-05-15T22:16:52.780
Modified: 2026-05-19T16:38:33.030
Link: CVE-2026-44565
No data.
OpenCVE Enrichment
Updated: 2026-05-16T00:00:12Z
Github GHSA