Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wwhq-cx22-f7vv | Open WebUI has an IDOR vulnerability in the update_message_by_id API endpoint |
Fri, 15 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-webui
Open-webui open-webui |
|
| Vendors & Products |
Open-webui
Open-webui open-webui |
Fri, 15 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, an IDOR vulnerability exists in the Channels feature of Open WebUI, allowing any channel member to modify messages sent by other members (including administrators) within the same channel. In the update_message_by_id function, for group or dm type channels, only the caller's membership in the channel is checked via the is_user_channel_member function, without verifying message ownership. This allows any channel member to modify messages sent by other members within the same channel. This vulnerability is fixed in 0.9.5. | |
| Title | Open WebUI: An IDOR vulnerability exists in the update_message_by_id API endpoint | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T20:29:36.884Z
Reserved: 2026-05-12T00:51:29.087Z
Link: CVE-2026-45385
No data.
Status : Received
Published: 2026-05-15T21:16:36.907
Modified: 2026-05-15T21:16:36.907
Link: CVE-2026-45385
No data.
OpenCVE Enrichment
Updated: 2026-05-15T22:15:09Z
Github GHSA