CVE-2026-45400

Open WebUI · Open WebUI

A security vulnerability has been identified in the Open WebUI platform, an AI interface designed for self-hosted, offline environments.

Executive summary

The Open WebUI platform is affected by a high-severity vulnerability, posing a significant risk to the security of self-hosted artificial intelligence infrastructure.

Vulnerability

The vulnerability represents a potential security weakness within the Open WebUI application logic, necessitating prompt investigation by administrators to determine the specific impact on their deployment.

Business impact

A CVSS score of 8.5 indicates a high probability of successful exploitation if left unaddressed, potentially resulting in unauthorized access to AI-driven workflows. Organizations relying on Open WebUI for sensitive data processing face potential data leakage if this flaw is weaponized against the host environment.

Remediation

Immediate Action: Monitor the Open WebUI official channels for patch release notifications and apply updates immediately upon availability.

Proactive Monitoring: Enable verbose logging on the application server to capture and analyze suspicious traffic patterns or unauthorized API calls.

Compensating Controls: Deploy a Web Application Firewall (WAF) with custom rules to filter suspicious requests intended for the Open WebUI service.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability demands immediate attention due to the high-severity classification. Security teams should ensure that the platform is not exposed to untrusted networks and prepare to patch systems immediately upon the release of vendor security fixes.