Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. open-webui
  4. ›
  5. CVE-2026-44564

CVE-2026-44564: Read-Only Open WebUI Users Can Modify Collaborative Documents via Socket.IO

May 8, 2026

The ydoc:document:update Socket.IO event handler checks whether the sender is a member of the document’s Socket.IO room (line 678) but does not verify that the sender has write permission. Users with read-only access join the document room via ydoc:document:join, which only requires read permission (line 520). Once in the room, the user can emit ydoc:document:update events that modify the in-memory Yjs document state and are broadcast to all other collaborators in real time.

The document_save_handler (line 600) correctly checks write permission before persisting to the database, so the attacker cannot directly save changes. However, the tampered content is visible to all collaborators, and if any user with write access saves the document, the injected content is persisted.

References

  • github.com/advisories/GHSA-vrfh-rj4q-rmhr
  • github.com/open-webui/open-webui
  • github.com/open-webui/open-webui/security/advisories/GHSA-vrfh-rj4q-rmhr
  • nvd.nist.gov/vuln/detail/CVE-2026-44564

Code Behaviors & Features

Detect and mitigate CVE-2026-44564 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.9.0

Fixed versions

  • 0.9.0

Solution

Upgrade to version 0.9.0 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

pypi/open-webui/CVE-2026-44564.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:19:36 +0000.