CVE-2026-0765

HIGH LAB

Openwebui Open Webui - OS Command Injection

Title source: rule

Description

Open WebUI PIP install_frontmatter_requirements Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Open WebUI. Authentication is required to exploit this vulnerability. The specific flaw exists within the install_frontmatter_requirements function.The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-28258.

Exploits (1)

github WORKING POC 1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2026-0765

Scores

CVSS v3 8.8
EPSS 0.0064
EPSS Percentile 70.3%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Lab Environment

Lab screenshot
vulnerable
docker pull ghcr.io/exploitintel/cve-2026-0765-vulnerable:latest
All Labs GitHub

Classification

CWE
CWE-78
Status published

Affected Products (1)

openwebui/open_webui

Timeline

Published Jan 23, 2026
Tracked Since Feb 18, 2026