CVE-2026-34222: Open WebUI: access control bypass leaks Tool Valve API keys
GHSA-7429-hxcv-268m HIGH PoC AVAILABLE CISA: TRACK*Any authenticated Open WebUI user can silently extract admin-configured API keys from Tool Valves — credentials that likely grant access to email servers, knowledge bases, or other backend systems. Upgrade to v0.8.11 immediately and rotate all API keys stored in Tool Valves. If you run Open WebUI with multi-user access and external tool integrations, assume credential compromise until rotated.
What is the risk?
High risk for any multi-user Open WebUI deployment using Tools with configured Valves. Exploitability is trivial: requires only a valid low-privilege account and a predictable tool ID (derived from the tool name). No special skills, no brute force, no admin interaction — just a single authenticated HTTP GET. The scope extends beyond Open WebUI itself since extracted API keys enable lateral movement into third-party systems (email, knowledge bases, shop backends). CVSS 7.7 reflects the chained impact accurately.
What systems are affected?
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | < 0.8.11 | 0.8.11 |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
What should I do?
5 steps-
Patch immediately: upgrade to Open WebUI v0.8.11 which adds authorization checks to the Tool Valves endpoint.
-
Rotate all API keys and secrets stored in Tool Valves — treat them as compromised if any non-admin users had access to the instance.
-
If patching is not immediate, restrict Open WebUI access to trusted admins only or take the instance offline.
-
Audit access logs for GET requests to /api/v1/tools/id/*/valves from non-admin accounts.
-
Implement least-privilege scopes for API keys stored in Valves — use service accounts with minimal permissions specific to the Open WebUI use case.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-34222?
Any authenticated Open WebUI user can silently extract admin-configured API keys from Tool Valves — credentials that likely grant access to email servers, knowledge bases, or other backend systems. Upgrade to v0.8.11 immediately and rotate all API keys stored in Tool Valves. If you run Open WebUI with multi-user access and external tool integrations, assume credential compromise until rotated.
Is CVE-2026-34222 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2026-34222, increasing the risk of exploitation.
How to fix CVE-2026-34222?
1. Patch immediately: upgrade to Open WebUI v0.8.11 which adds authorization checks to the Tool Valves endpoint. 2. Rotate all API keys and secrets stored in Tool Valves — treat them as compromised if any non-admin users had access to the instance. 3. If patching is not immediate, restrict Open WebUI access to trusted admins only or take the instance offline. 4. Audit access logs for GET requests to /api/v1/tools/id/*/valves from non-admin accounts. 5. Implement least-privilege scopes for API keys stored in Valves — use service accounts with minimal permissions specific to the Open WebUI use case.
What systems are affected by CVE-2026-34222?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, LLM tool integrations, RAG pipelines, AI assistants with external API access, enterprise LLM gateways.
What is the CVSS score for CVE-2026-34222?
CVE-2026-34222 has a CVSS v3.1 base score of 7.7 (HIGH). The EPSS exploitation probability is 0.01%.
Technical Details
NVD Description
# Summary ## Broken Access Control in Tool Valves Open WebUI supports function calling through "Tools". Function calling allows an LLM to reliably connect to external tools and interact with external APIs. Exemplary use-cases include connecting to an internal knowledge base, retrieving emails from an exchange server, or retrieving order data from a shop backend. These interactions often require the LLM to authenticate against backend services using API keys specifically created for a technical (Open WebUI) user. To simplify configuration and secret handling, Open WebUI implements "Valves" and "UserValves" that allow users and administrators to input dynamic details like API keys or configuration options. Valves have the following distinction: - **Valves:** Configurable by admins only. - **UserValves:** Configurable by any user. The Tool Valves endpoint does not properly restrict read access to the valve. This allows a low privileged user to access all data contained within the valve. In the worst case, this gives a low privileged "Member" user access to sensitive Tool data, such as API keys for third-party systems. --- # Details ## 1) Broken Access Control in Tool Valves The following steps can be performed to reproduce the vulnerability. **1.** An administrator creates an Open WebUI Tool with a configured Valve. <img width="1038" height="597" alt="image" src="https://github.com/user-attachments/assets/f79bdde9-18fa-49e4-a6c3-5077731f0815" /> **2.** The administrator configures the API key within the Tool Valve. <img width="1039" height="446" alt="image" src="https://github.com/user-attachments/assets/d88d06b9-fc21-45e5-8142-d9f874601f87" /> **3.** A user with at least "Member" privileges logs into Open WebUI. The following screenshot shows the user overview of the test instance: <img width="908" height="354" alt="image" src="https://github.com/user-attachments/assets/40025151-418d-4912-8400-1e1a6e5cd4e4" /> The following screenshot illustrates that the "lowpriv" user doesn't have access to the tool: <img width="815" height="433" alt="image" src="https://github.com/user-attachments/assets/ec06b07f-9735-4728-9dce-d97d721051b8" /> **4.** The "lowpriv" user uses their Authorization token to retrieve the API key from the Tool Valve. In order to do so, the attacker needs to know the Tool ID. However, as this ID is always the same for imported tools, and the tool IDs are concatenated from the tool name, guessing tool IDs is trivial. <img width="754" height="208" alt="image" src="https://github.com/user-attachments/assets/61c80cac-25c8-4730-8156-90869801389f" /> As seen in the following code snippet, the vulnerability is present because the Tool Valves route does not check if the requesting user has administrative permissions (Line 515). [Source: `backend/open_webui/routers/tools.py` L513–L531](https://github.com/open-webui/open-webui/blob/2b26355002064228e9b671339f8f3fb9d1fafa73/backend/open_webui/routers/tools.py#L513-L531) --- # PoC You can find the detailed PoC steps in the [Details](#details) section. To execute the exploit: 1. Login as a verified user and copy the authorization token. 2. Access the configured valve of any existing tool with the following request (please mind the placeholders): ```http GET /api/v1/tools/id/<tool_id>/valves HTTP/1.1 Host: <your_test_host> Authorization: Bearer <authorization_token_from_step_1> ``` --- # Impact This information disclosure vulnerability allows low privileged users to access sensitive values stored in Tool Valves. Anyone using Open WebUI Tools with a configured Valve is affected. In the worst case, exploitation allows an attacker to access third-party systems within the context of the configured Open WebUI technical user. --- # Additional Remarks Additional remarks regarding the CVSS Vector String: | Component | Value | Rationale | |-----------|-------|-----------| | AC | L | Due to the requirement of a "Member" account | | C | H | Sensitive data, such as API Keys for backend systems, is disclosed | | S | C | Exploitation of this vulnerability grants access to third-party systems | --- > **AI report transparency:** AI was used for refinement of this advisory text.
Exploitation Scenario
An attacker obtains a low-privilege 'Member' account on an Open WebUI instance — either through credential stuffing, phishing, or by registering if open registration is enabled. They enumerate tool IDs by guessing predictable names (e.g., 'email-connector', 'sharepoint-search', 'crm-lookup') or by observing tool names visible in the UI. A single authenticated GET to /api/v1/tools/id/<tool_id>/valves returns the admin-configured API keys in plaintext. The attacker then uses those keys to access the Exchange server, SharePoint, or other backend system as the Open WebUI service account — potentially exfiltrating emails, documents, or customer data without triggering any Open WebUI audit event.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2026-45672 8.8 open-webui: code exec gate bypass via API endpoint
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2026-45315 8.7 open-webui: stored XSS → JWT theft and admin takeover
Same package: open-webui