Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-65pg-qhhw-mxwg | Open WebUI Vulnerable to Unauthenticated RAG Configuration Disclosure |
Fri, 15 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-webui
Open-webui open-webui |
|
| Vendors & Products |
Open-webui
Open-webui open-webui |
Fri, 15 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, GET /api/v1/retrieval/ returns live RAG pipeline configuration to any unauthenticated HTTP client. No Authorization header, cookie, or API key is required. Every adjacent endpoint on the same router (/embedding, /config) is correctly guarded by get_admin_user making this a targeted omission. This vulnerability is fixed in 0.9.5. | |
| Title | Open WebUI: Unauthenticated RAG Configuration Disclosure | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T20:34:23.736Z
Reserved: 2026-05-12T01:48:40.451Z
Link: CVE-2026-45397
No data.
Status : Received
Published: 2026-05-15T21:16:37.730
Modified: 2026-05-15T21:16:37.730
Link: CVE-2026-45397
No data.
OpenCVE Enrichment
Updated: 2026-05-15T21:30:08Z
Github GHSA