CVE-2026-44551

Open WebUI · Open WebUI

The LDAP authentication endpoint in Open WebUI fails to validate non-empty passwords, allowing unauthenticated attackers to bypass authentication and obtain session tokens.

Executive summary

An authentication bypass vulnerability in Open WebUI allows unauthenticated attackers to gain unauthorized access to the platform via empty LDAP password submissions.

Vulnerability

This is an authentication bypass vulnerability occurring in the LDAP bind process; the application fails to enforce a minimum length constraint on the password field, permitting an unauthenticated attacker to successfully bind as an arbitrary user.

Business impact

Successful exploitation leads to full account takeover, granting attackers unauthorized access to sensitive AI data and administrative functions. With a CVSS score of 9.1, this represents a critical risk to data confidentiality and integrity.

Remediation

Immediate Action: Upgrade the Open WebUI instance to version 0.9.0 or later to ensure proper LDAP password validation.

Proactive Monitoring: Review LDAP authentication logs for patterns of unusual bind requests or successful logins with anomalous user-agent strings.

Compensating Controls: Implement network-level restrictions to limit access to the login interface to trusted IP ranges until the patch can be applied.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical severity of this authentication bypass, administrators must prioritize the update to version 0.9.0 immediately. Failure to patch leaves the platform vulnerable to trivial account takeover by unauthenticated remote actors.