CVE-2026-45314
HIGHOpen WebUI: XSS via SVG in /api/v1/channels/webhooks/{webhook_id}/profile/image
Title source: cnaDescription
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the channel webhook create/update flow accepts arbitrary profile_image_url values, including data:image/svg+xml;base64,... payloads. The profile image endpoint then decodes and serves this SVG as image/svg+xml without sanitization, allowing attacker-controlled script handlers (for example onload) to execute when the profile-image URL is opened in the browser. This vulnerability is fixed in 0.9.3.
References (1)
Core 1
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/open-webui/open-webui/security/advisories/GHSA-3856-3vxq-m6fc
Scores
CVSS v4
7.4
EPSS
0.0005
EPSS Percentile
14.4%
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Details
CWE
CWE-87
Status
published
Products (1)
open-webui/open-webui
< 0.9.3
Published
May 15, 2026
Tracked Since
May 16, 2026