Skip to content

Open WebUI Missing Access Check on Channel Members Endpoint for Standard Channels

Moderate severity GitHub Reviewed Published May 5, 2026 in open-webui/open-webui • Updated May 15, 2026

Package

pip open-webui (pip)

Affected versions

<= 0.8.12

Patched versions

0.9.0

Description

Missing Access Check on Channel Members Endpoint for Standard Channels

Affected Component

Channel members listing endpoint:

  • backend/open_webui/routers/channels.py (lines 445-507, get_channel_members_by_id)

Affected Versions

Current main branch and likely all versions with the channels feature.

Description

The GET /api/v1/channels/{id}/members endpoint only checks membership for group and dm channel types (lines 467-469). For standard channels — including private ones — there is no channel_has_access check before returning the member list. Any authenticated user who knows a private channel's UUID can enumerate all users with access to that channel.

# Line 467-469: only group/dm channels are checked
if channel.type in ['group', 'dm']:
    if not Channels.is_user_channel_member(channel.id, user.id, db=db):
        raise HTTPException(...)
# Standard channels fall through with NO access check

Compare with other channel endpoints (e.g., get_channel_messages at line 688) which correctly call channel_has_access(user.id, channel, permission='read') for standard channels.

CVSS 3.1 Breakdown

Metric Value Rationale
Attack Vector Network (N) Exploited remotely via API call
Attack Complexity Low (L) Single API call, no special conditions
Privileges Required Low (L) Requires a valid user account
User Interaction None (N) No victim interaction required
Scope Unchanged (U) Impact is within the channel authorization boundary
Confidentiality Low (L) Leaks user identities and details for a private channel
Integrity None (N) No data modification
Availability None (N) No denial of service

Attack Scenario

  1. Attacker obtains a private standard channel's UUID (via logs, browser history, URL observation, or other API responses).
  2. Attacker calls GET /api/v1/channels/{id}/members.
  3. The server returns the full list of permitted users including their IDs, names, emails, roles, and profile images.
  4. The attacker has no access to the channel's messages (those endpoints check access correctly), but now knows exactly who does.

Impact

  • Leaks the identity and personal details of every user with access to a private channel
  • Reveals organizational structure and project assignments
  • Enables targeted social engineering against channel members

Preconditions

  • Channels feature must be enabled (disabled by default)
  • Attacker must know the channel UUID (not guessable, but obtainable through indirect means)

References

@doge-woof doge-woof published to open-webui/open-webui May 5, 2026
Published to the GitHub Advisory Database May 8, 2026
Reviewed May 8, 2026
Published by the National Vulnerability Database May 15, 2026
Last updated May 15, 2026

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

EPSS score

Weaknesses

Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action. Learn more on MITRE.

CVE ID

CVE-2026-44559

GHSA ID

GHSA-c7wp-3qh5-55pv

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.