CVE-2026-29071
Received Received - Intake
Insecure Direct Object Reference in Open WebUI Allows Data Exposure

Publication date: 2026-03-27

Last updated on: 2026-04-01

Assigner: GitHub, Inc.

Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, any authenticated user can read other users' private memories via `/api/v1/retrieval/query/collection`. Version 0.8.6 patches the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openwebui open_webui to 0.8.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-29071 is an Insecure Direct Object Reference (IDOR) vulnerability in the Open WebUI platform versions up to 0.8.5. It allows any authenticated user to access private data of other users without proper authorization checks.

Specifically, the vulnerable endpoint `/api/v1/retrieval/query/collection` accepts requests to retrieve collections of data such as user files and private memories but does not verify if the requesting user owns or has permission to access those collections.

An attacker can enumerate all users and their UUIDs, emails, and roles via another endpoint, then use those UUIDs to query and retrieve private memories or files belonging to other users, including administrators.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing whether an authenticated user can access other users' private data without proper authorization.

  • Enumerate users by sending a GET request to the endpoint `/api/v1/users/search` to retrieve UUIDs, emails, and roles.
  • Attempt to access private memories by sending a POST request to `/api/v1/retrieval/query/collection` with the JSON body containing `collection_names` set to `["user-memory-<target_user_UUID>"]`.
  • Attempt to access private files by sending a POST request to `/api/v1/retrieval/query/collection` with `collection_names` set to `["file-<file_UUID>"]`.

These steps require authentication and the Memory experimental feature to be enabled for memory access.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, upgrade Open WebUI to version 0.8.6 or later where the issue is patched.

If upgrading is not immediately possible, restrict access to the `/api/v1/users/search` endpoint to admin users only or limit the information returned to non-privileged users.

Implement ownership validation in the `query_collection_handler` function to ensure users can only access their own private memories and files unless they have admin privileges.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows any authenticated user to access other users' private data, including personal memories and files, without proper authorization. Such unauthorized exposure of personal and sensitive data can lead to violations of privacy regulations like GDPR and HIPAA, which mandate strict controls over access to personal and health-related information.

Specifically, the leakage of private memories used for personalization and user files can be considered a breach of confidentiality requirements under these standards. The ability to enumerate users and access their private data without admin privileges increases the risk of non-compliance with data protection laws that require limiting data access to authorized personnel only.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of private data within the Open WebUI platform.

  • Exposure of private files and personal memories of other users, including sensitive information used for AI personalization.
  • User enumeration allowing attackers to gather UUIDs, emails, names, and roles of all users, including administrators.
  • No administrative privileges are required to exploit this vulnerability; any authenticated user can perform the attack.

Overall, this leads to a breach of privacy and potential misuse of sensitive user data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart