PatchSiren cyber security CVE debrief
CVE-2026-45396 open-webui CVE debrief
CVE-2026-45396 affects Open WebUI versions prior to 0.9.5. The POST /api/v1/evaluations/feedback endpoint allows an authenticated requester to supply fields that should be server-controlled. Because FeedbackForm is configured with extra='allow' and insert_new_feedback() merges data in an insecure order, a client-supplied user_id can overwrite the intended server-derived value. The practical impact is forged feedback attribution, Elo leaderboard corruption, and identity spoofing. NVD maps the issue to CWE-915 and rates it CVSS 5.4 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).
- Vendor
- open-webui
- Product
- Unknown
- CVSS
- MEDIUM 5.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-15
- Original CVE updated
- 2026-05-19
- Advisory published
- 2026-05-15
- Advisory updated
- 2026-05-19
Who should care
Administrators, operators, and developers running Open WebUI deployments that use the evaluations/feedback feature or rely on leaderboard integrity and user attribution.
Technical summary
The issue is a mass-assignment problem in the feedback submission path. The GitHub security advisory referenced by NVD describes FeedbackForm using model_config = ConfigDict(extra='allow'), which permits unexpected fields in the request body. In insert_new_feedback(), an insecure merge order lets a request-supplied user_id override the server-derived value. That enables an authenticated attacker to create feedback records credited to an arbitrary user, distorting evaluation scores and related attribution data.
Defensive priority
Medium. The flaw requires authentication and does not affect confidentiality, but it can directly tamper with identity attribution and scoring data in a core application workflow.
Recommended defensive actions
- Upgrade Open WebUI to version 0.9.5 or later, which the advisory says fixes the issue.
- Verify that the feedback endpoint rejects client-supplied user_id values and that attribution is derived only from server-side identity.
- Review existing feedback and leaderboard data for suspicious or inconsistent user attribution after exposure.
- Monitor for unusual feedback submissions until patched, especially if the evaluations feature is internet-reachable.
Evidence notes
The supplied Open WebUI advisory text states that versions before 0.9.5 are affected, that FeedbackForm uses extra='allow', and that an insecure merge order in insert_new_feedback() can let an authenticated attacker overwrite user_id. The NVD metadata lists the vulnerability as 'Undergoing Analysis', assigns CVSS 3.1 vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L, and maps the weakness to CWE-915. The supplied timestamps place publication on 2026-05-15 and modification on 2026-05-18.
Official resources
-
CVE-2026-45396 CVE record
CVE.org
-
CVE-2026-45396 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Vendor Advisory
Publicly disclosed through the Open WebUI GitHub security advisory referenced by NVD and assigned CVE-2026-45396. The CVE was published on 2026-05-15 and updated on 2026-05-18; NVD still listed it as undergoing analysis at that time.