PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-45396 open-webui CVE debrief

CVE-2026-45396 affects Open WebUI versions prior to 0.9.5. The POST /api/v1/evaluations/feedback endpoint allows an authenticated requester to supply fields that should be server-controlled. Because FeedbackForm is configured with extra='allow' and insert_new_feedback() merges data in an insecure order, a client-supplied user_id can overwrite the intended server-derived value. The practical impact is forged feedback attribution, Elo leaderboard corruption, and identity spoofing. NVD maps the issue to CWE-915 and rates it CVSS 5.4 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).

Vendor
open-webui
Product
Unknown
CVSS
MEDIUM 5.4
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-15
Original CVE updated
2026-05-19
Advisory published
2026-05-15
Advisory updated
2026-05-19

Who should care

Administrators, operators, and developers running Open WebUI deployments that use the evaluations/feedback feature or rely on leaderboard integrity and user attribution.

Technical summary

The issue is a mass-assignment problem in the feedback submission path. The GitHub security advisory referenced by NVD describes FeedbackForm using model_config = ConfigDict(extra='allow'), which permits unexpected fields in the request body. In insert_new_feedback(), an insecure merge order lets a request-supplied user_id override the server-derived value. That enables an authenticated attacker to create feedback records credited to an arbitrary user, distorting evaluation scores and related attribution data.

Defensive priority

Medium. The flaw requires authentication and does not affect confidentiality, but it can directly tamper with identity attribution and scoring data in a core application workflow.

Recommended defensive actions

  • Upgrade Open WebUI to version 0.9.5 or later, which the advisory says fixes the issue.
  • Verify that the feedback endpoint rejects client-supplied user_id values and that attribution is derived only from server-side identity.
  • Review existing feedback and leaderboard data for suspicious or inconsistent user attribution after exposure.
  • Monitor for unusual feedback submissions until patched, especially if the evaluations feature is internet-reachable.

Evidence notes

The supplied Open WebUI advisory text states that versions before 0.9.5 are affected, that FeedbackForm uses extra='allow', and that an insecure merge order in insert_new_feedback() can let an authenticated attacker overwrite user_id. The NVD metadata lists the vulnerability as 'Undergoing Analysis', assigns CVSS 3.1 vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L, and maps the weakness to CWE-915. The supplied timestamps place publication on 2026-05-15 and modification on 2026-05-18.

Official resources

Publicly disclosed through the Open WebUI GitHub security advisory referenced by NVD and assigned CVE-2026-45396. The CVE was published on 2026-05-15 and updated on 2026-05-18; NVD still listed it as undergoing analysis at that time.