Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vrfh-rj4q-rmhr | Read-Only Open WebUI Users Can Modify Collaborative Documents via Socket.IO |
Fri, 15 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-webui
Open-webui open-webui |
|
| Vendors & Products |
Open-webui
Open-webui open-webui |
Fri, 15 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the ydoc:document:update Socket.IO event handler checks whether the sender is a member of the document's Socket.IO room (line 678) but does not verify that the sender has write permission. Users with read-only access join the document room via ydoc:document:join, which only requires read permission (line 520). Once in the room, the user can emit ydoc:document:update events that modify the in-memory Yjs document state and are broadcast to all other collaborators in real time. This vulnerability is fixed in 0.9.0. | |
| Title | Open WebUI: Read-Only Users Can Modify Collaborative Documents via Socket.IO | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T21:10:37.258Z
Reserved: 2026-05-06T20:59:00.595Z
Link: CVE-2026-44564
Updated: 2026-05-15T21:10:34.013Z
Status : Received
Published: 2026-05-15T20:16:48.130
Modified: 2026-05-15T20:16:48.130
Link: CVE-2026-44564
No data.
OpenCVE Enrichment
Updated: 2026-05-15T20:45:08Z
Github GHSA