Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v6qf-75pr-p96m | Open WebUI: Authenticated users can bypass model access control via exposed query parameter [AI-ASSISTED] |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openwebui
Openwebui open Webui |
|
| CPEs | cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openwebui
Openwebui open Webui |
Fri, 15 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-webui
Open-webui open-webui |
|
| Vendors & Products |
Open-webui
Open-webui open-webui |
Fri, 15 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.11, an internal-only bypass_filter parameter is exposed on the /openai/chat/completions and /ollama/api/chat HTTP endpoints via FastAPI query string binding, allowing any authenticated user to append ?bypass_filter=true and bypass model access control checks to invoke admin-restricted models. This vulnerability is fixed in 0.8.11. | |
| Title | Open WebUI: Authenticated users can bypass model access control via exposed query parameter | |
| Weaknesses | CWE-285 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-19T12:27:12.309Z
Reserved: 2026-05-12T00:51:29.085Z
Link: CVE-2026-45365
Updated: 2026-05-19T12:26:41.963Z
Status : Modified
Published: 2026-05-15T22:16:55.590
Modified: 2026-05-19T14:16:46.033
Link: CVE-2026-45365
No data.
OpenCVE Enrichment
Updated: 2026-05-15T23:00:14Z
Github GHSA