Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. open-webui
  4. ›
  5. CVE-2026-44568

CVE-2026-44568: Open WebUI has Stored XSS in Pending User Overlay via Incorrect DOMPurify Application Order

May 8, 2026

An admin can inject arbitrary JavaScript into the Pending User Overlay Content that executes in the browser context of any pending user who views the overlay page. This could be used to:

  • Session hijacking: Steal pending users’ JWT tokens from cookies/localStorage
  • Credential theft: Replace the pending overlay with a fake login form
  • Phishing: Redirect pending users to malicious sites

While this requires admin privileges to set the overlay content, it enables an admin to attack pending users (who have not yet been granted full access). In multi-admin deployments, a compromised admin account could use this to escalate attacks.

References

  • github.com/advisories/GHSA-fq3v-xjjx-95rc
  • github.com/open-webui/open-webui
  • github.com/open-webui/open-webui/security/advisories/GHSA-fq3v-xjjx-95rc
  • nvd.nist.gov/vuln/detail/CVE-2026-44568

Code Behaviors & Features

Detect and mitigate CVE-2026-44568 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.9.0

Fixed versions

  • 0.9.0

Solution

Upgrade to version 0.9.0 or above.

Impact 4.8 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

pypi/open-webui/CVE-2026-44568.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:18:20 +0000.