CVE-2026-28786

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, an unsanitized filename field in the speech-to-text transcription endpoint allows any authenticated non-admin user to trigger a `FileNotFoundError` whose message — including the server's absolute `DATA_DIR` path — is returned verbatim in the HTTP 400 response body, confirming information disclosure on all default deployments. Version 0.8.6 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:*

History

30 Mar 2026, 17:25

Type Values Removed Values Added
First Time Openwebui open Webui
Openwebui
CPE cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:*
References () https://github.com/open-webui/open-webui/security/advisories/GHSA-vvxm-vxmr-624h - () https://github.com/open-webui/open-webui/security/advisories/GHSA-vvxm-vxmr-624h - Exploit, Vendor Advisory

Information

Published : 2026-03-27 00:16

Updated : 2026-03-30 17:25


NVD link : CVE-2026-28786

Mitre link : CVE-2026-28786

CVE.ORG link : CVE-2026-28786


JSON object : View

Products Affected

openwebui

  • open_webui
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-209

Generation of Error Message Containing Sensitive Information