VulnerabilitiesHIGH

Broken Access Control - High Risk in Open WebUI Discovered

Featured image for Broken Access Control - High Risk in Open WebUI Discovered
FDFull Disclosure
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, a flaw in Open WebUI lets some users see secret information they shouldn't.

Quick Summary

A serious vulnerability has been found in Open WebUI, allowing low-privileged users to access sensitive data. This flaw, CVE-2026-34222, poses a high risk. Users must update to the latest version to secure their systems.

What Happened

SEC Consult Vulnerability Lab has disclosed a serious vulnerability in Open WebUI, a self-hosted AI interface. This flaw, identified as CVE-2026-34222, involves broken access control in the Tool Valves feature. It allows low-privileged users to access sensitive data, including API keys, which should only be available to administrators.

The Flaw

The vulnerability arises from improper restrictions on the Tool Valves endpoint. This endpoint should only allow administrators to access certain configurations. However, due to a lack of proper checks, a user with merely 'Member' privileges can retrieve sensitive information. This could lead to unauthorized access to third-party systems, significantly compromising security.

What's at Risk

The potential impact of this vulnerability is high. If exploited, it could allow an attacker to gain access to sensitive API keys and other configurations that could be used to manipulate or extract data from connected systems. Such access could lead to data breaches or unauthorized actions within the organization.

Patch Status

The vendor has released a patched version, v0.8.11, which addresses this vulnerability. Users are strongly advised to upgrade to this version to mitigate risks associated with this flaw. The patch can be found on the official Open WebUI GitHub releases page.

Immediate Actions

  • Update Open WebUI to version v0.8.11 immediately.
  • Conduct a thorough security review of your Open WebUI setup to identify any other potential vulnerabilities.
  • Monitor for any unusual activity that may indicate exploitation of this flaw.

Conclusion

This vulnerability highlights the critical importance of proper access controls in software applications. Organizations using Open WebUI should prioritize applying the patch and reviewing their security posture to protect against potential exploitation.

🔒 Pro insight: The lack of proper access controls in Open WebUI underscores the need for rigorous security reviews in software development.

Original article from

FDFull Disclosure
Read Full Article

Related Pings

CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·