| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-24c9-2m8q-qhmh | Open WebUI Vulnerable to SSRF via OAuth Profile Picture URL in _process_picture_url (oauth.py) |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 15 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-webui
Open-webui open-webui |
|
| Vendors & Products |
Open-webui
Open-webui open-webui |
Fri, 15 May 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338). The function fetches arbitrary URLs from OAuth picture claims without applying validate_url(), allowing an attacker to force the server to make HTTP requests to internal resources and exfiltrate the full response. This vulnerability is fixed in 0.9.0. | |
| Title | Open WebUI: SSRF via OAuth Profile Picture URL in _process_picture_url (oauth.py) | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T22:21:22.453Z
Reserved: 2026-05-11T21:40:08.176Z
Link: CVE-2026-45338
Updated: 2026-05-15T22:20:41.607Z
Status : Received
Published: 2026-05-15T22:16:54.790
Modified: 2026-05-15T23:16:21.180
Link: CVE-2026-45338
No data.
OpenCVE Enrichment
Updated: 2026-05-15T23:30:10Z
Github GHSA