CVE-2026-45347
MEDIUMOpen WebUI: Blind server side request forgery (SSRF) via the PDF generate function
Title source: cnaDescription
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.5.11, there is a blind server side request forgery (SSRF) via the PDF generate function. In the PDF export, user inputs are interpreted as HTML and embedded into the PDF. According to tests, scripts and some potentially dangerous tags (iFrame, Object, etc.) are blocked, preventing server-side content from being read through this vulnerability. However, an image tag can be used to force a server-side request (SSRF), as shown in the following below. This vulnerability is fixed in 0.5.11.
References (1)
Core 1
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/open-webui/open-webui/security/advisories/GHSA-f776-fp4w-266c
Scores
CVSS v3
4.3
EPSS
0.0003
EPSS Percentile
8.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (3)
open-webui/open-webui
< 0.5.11
openwebui/open_webui
< 0.5.11
pypi/open-webui
0 - 0.5.11PyPI
Published
May 15, 2026
Tracked Since
May 16, 2026