Authorization bypass through user-controlled key in Open WebUI - #VU131122
Published: May 12, 2026
Open WebUI
Detailed vulnerability description
The vulnerability allows a remote user to read, modify, and delete arbitrary files owned by other users.
The vulnerability exists due to improper access control in has_access_to_file() in backend/open_webui/routers/files.py when handling file access requests for files referenced by shared chats. A remote user can send crafted requests to file endpoints using a valid file UUID to read, modify, and delete arbitrary files owned by other users.
User interaction is required because the target file must be referenced in a shared chat, and file UUIDs may be disclosed to users with read access to a knowledge base via GET /api/v1/knowledge/{id}/files.