CVE-2026-28786: Open WebUI vulnerable to Path Traversal in `POST /api/v1/audio/transcriptions`
An unsanitised filename field in the speech-to-text transcription endpoint allows any authenticated non-admin user to trigger a FileNotFoundError whose message — including the server’s absolute DATA_DIR path — is returned verbatim in the HTTP 400 response body, confirming information disclosure on all default deployments.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-28786 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →