| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4v7r-f4w8-8972 | Open WebUI has a full SSRF Vulnerability in the RAG Web Search Feature |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 15 May 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-webui
Open-webui open-webui |
|
| Vendors & Products |
Open-webui
Open-webui open-webui |
Fri, 15 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does NOT implement the private keyword for IPv6 — the call raises a ValidationError (which is falsy in a boolean context), so every IPv6 address passes the filter. In addition, IPv4-mapped IPv6 (::ffff:10.0.0.1) bypasses the IPv4 check entirely, and several reserved IPv4 ranges (0.0.0.0/8, 100.64.0.0/10, 192.0.0.0/24, etc.) are not blocked. This vulnerability is fixed in 0.9.0. | |
| Title | Open WebUI: Full SSRF Vulnerability in the RAG Web Search Feature | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T22:21:52.962Z
Reserved: 2026-05-11T20:50:30.540Z
Link: CVE-2026-45331
Updated: 2026-05-15T22:14:11.067Z
Status : Received
Published: 2026-05-15T20:16:48.563
Modified: 2026-05-15T23:16:21.073
Link: CVE-2026-45331
No data.
OpenCVE Enrichment
Updated: 2026-05-15T21:45:09Z
Github GHSA