Platform
python
Component
open-webui
Fixed in
0.6.33
CVE-2026-0766 is a Remote Code Execution (RCE) vulnerability affecting Open WebUI versions 0.6.32. This flaw stems from insufficient input validation within the loadtoolmodulebyid function, enabling authenticated attackers to execute arbitrary code. Successful exploitation requires authentication, but the potential impact is significant, allowing for complete system compromise. The vulnerability was disclosed on January 23, 2026.
An attacker exploiting CVE-2026-0766 can execute arbitrary code on the affected Open WebUI instance. Given that Open WebUI is often used for managing network devices, this could lead to complete control over those devices. Attackers could potentially modify configurations, steal sensitive data (credentials, device settings), or use the compromised device as a pivot point to attack other systems on the network. The ability to execute code in the context of the service account amplifies the potential damage, as this account may have elevated privileges. This vulnerability shares similarities with command injection flaws where untrusted input is directly incorporated into system commands.
CVE-2026-0766 was reported to ZDI as ZDI-CAN-28257 and publicly disclosed on January 23, 2026. The vulnerability's severity is currently being evaluated, and its inclusion in the CISA KEV catalog is pending. Public proof-of-concept (PoC) code is likely to emerge, increasing the risk of exploitation. Active campaigns targeting Open WebUI instances are possible, particularly if the vulnerability is easily exploitable and widely publicized.
Exploit Status
EPSS
0.29% (53% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-0766 is to upgrade to a patched version of Open WebUI as soon as it becomes available. Until a patch is released, restrict access to the Open WebUI interface to only trusted users and networks. Implement strict input validation on all user-supplied data within the loadtoolmodulebyid function as a temporary workaround, although this requires significant code modification. Monitor system logs and network traffic for any suspicious activity, particularly attempts to execute unusual commands or access sensitive files. Consider implementing a Web Application Firewall (WAF) to filter potentially malicious requests. After upgrade, confirm functionality by testing key features and verifying that the loadtoolmodulebyid function no longer accepts arbitrary code execution.
Actualice Open WebUI a una versión posterior a 0.6.32 que corrija la vulnerabilidad de inyección de comandos. Consulte el sitio web del proveedor o las notas de la versión para obtener instrucciones específicas sobre cómo actualizar.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-0766 is a Remote Code Execution vulnerability in Open WebUI version 0.6.32, allowing authenticated attackers to execute arbitrary code due to insufficient input validation. This poses a significant security risk.
If you are running Open WebUI version 0.6.32, you are potentially affected by this vulnerability. Upgrade to a patched version as soon as possible to mitigate the risk.
The recommended fix is to upgrade to a patched version of Open WebUI. Until a patch is available, restrict access and implement temporary workarounds like input validation and WAF rules.
While active exploitation is not yet confirmed, the vulnerability is publicly known, and the potential for exploitation is high. Monitoring and proactive mitigation are crucial.
Refer to the official Open WebUI website and security advisories for the latest information and updates regarding CVE-2026-0766.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.