プラットフォーム
python
コンポーネント
open-webui
修正版
0.6.33
CVE-2026-0766 is a Remote Code Execution (RCE) vulnerability affecting Open WebUI versions 0.6.32. This flaw stems from insufficient input validation within the loadtoolmodulebyid function, enabling authenticated attackers to execute arbitrary code. Successful exploitation requires authentication, but the potential impact is significant, allowing for complete system compromise. The vulnerability was disclosed on January 23, 2026.
An attacker exploiting CVE-2026-0766 can execute arbitrary code on the affected Open WebUI instance. Given that Open WebUI is often used for managing network devices, this could lead to complete control over those devices. Attackers could potentially modify configurations, steal sensitive data (credentials, device settings), or use the compromised device as a pivot point to attack other systems on the network. The ability to execute code in the context of the service account amplifies the potential damage, as this account may have elevated privileges. This vulnerability shares similarities with command injection flaws where untrusted input is directly incorporated into system commands.
CVE-2026-0766 was reported to ZDI as ZDI-CAN-28257 and publicly disclosed on January 23, 2026. The vulnerability's severity is currently being evaluated, and its inclusion in the CISA KEV catalog is pending. Public proof-of-concept (PoC) code is likely to emerge, increasing the risk of exploitation. Active campaigns targeting Open WebUI instances are possible, particularly if the vulnerability is easily exploitable and widely publicized.
Organizations utilizing Open WebUI for network device management are at risk, particularly those relying on version 0.6.32. Shared hosting environments where multiple users share the same Open WebUI instance are also vulnerable, as a compromised account could be used to exploit the vulnerability and gain access to other users' devices. Legacy configurations with default credentials or weak access controls further exacerbate the risk.
• linux / server:
journalctl -u openwebui -g 'load_tool_module_by_id'• generic web:
curl -I http://<openwebui_ip>/api/v1/tools/load_tool_module_by_id?module_id=<suspicious_input>• generic web:
Grep access/error logs for requests containing suspicious characters or patterns within the module_id parameter. Look for unusual Python code execution attempts.
disclosure
エクスプロイト状況
EPSS
0.29% (53% パーセンタイル)
CISA SSVC
CVSS ベクトル
The primary mitigation for CVE-2026-0766 is to upgrade to a patched version of Open WebUI as soon as it becomes available. Until a patch is released, restrict access to the Open WebUI interface to only trusted users and networks. Implement strict input validation on all user-supplied data within the loadtoolmodulebyid function as a temporary workaround, although this requires significant code modification. Monitor system logs and network traffic for any suspicious activity, particularly attempts to execute unusual commands or access sensitive files. Consider implementing a Web Application Firewall (WAF) to filter potentially malicious requests. After upgrade, confirm functionality by testing key features and verifying that the loadtoolmodulebyid function no longer accepts arbitrary code execution.
Actualice Open WebUI a una versión posterior a 0.6.32 que corrija la vulnerabilidad de inyección de comandos. Consulte el sitio web del proveedor o las notas de la versión para obtener instrucciones específicas sobre cómo actualizar.
脆弱性分析と重要アラートをメールでお届けします。
CVE-2026-0766 is a Remote Code Execution vulnerability in Open WebUI version 0.6.32, allowing authenticated attackers to execute arbitrary code due to insufficient input validation. This poses a significant security risk.
If you are running Open WebUI version 0.6.32, you are potentially affected by this vulnerability. Upgrade to a patched version as soon as possible to mitigate the risk.
The recommended fix is to upgrade to a patched version of Open WebUI. Until a patch is available, restrict access and implement temporary workarounds like input validation and WAF rules.
While active exploitation is not yet confirmed, the vulnerability is publicly known, and the potential for exploitation is high. Monitoring and proactive mitigation are crucial.
Refer to the official Open WebUI website and security advisories for the latest information and updates regarding CVE-2026-0766.
requirements.txt ファイルをアップロードすると、影響の有無を即座にお知らせします。