Improperly Controlled Modification of Dynamically-Determined Object Attributes in Open WebUI - #VU130948
Published: May 11, 2026
Open WebUI
Open WebUI
Description
The vulnerability allows a remote user to manipulate evaluation data and spoof feedback authorship.
The vulnerability exists due to improperly controlled modification of dynamically-determined object attributes in the POST /api/v1/evaluations/feedback endpoint when processing feedback creation requests. A remote user can submit a specially crafted request with extra fields such as user_id to manipulate evaluation data and spoof feedback authorship.
The issue is caused by FeedbackForm accepting unexpected fields via extra='allow' and by insert_new_feedback() merging form data after server-derived values, allowing request-supplied fields to overwrite user_id, id, and version.