# Channel Access Grants Bypass filter_allowed_access_grants ## Affected Component Channel creation and update endpoints: - `backend/open_webui/routers/channels.py` (lines 291-340, `create_new_channel`) - `backend/open_webui/routers/channels.py` (lines 617-638, `update_channel_by_id`) -...
Full CISO analysis pending enrichment.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.8.12 | 0.9.0 |
Do you use open-webui? You're affected.
Severity & Risk
Attack Surface
Recommended Action
Patch available
Update open-webui to version 0.9.0
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Frequently Asked Questions
What is CVE-2026-44558?
Open WebUI's Channel Access Grants Bypass filter_allowed_access_grants
Is CVE-2026-44558 actively exploited?
No confirmed active exploitation of CVE-2026-44558 has been reported, but organizations should still patch proactively.
How to fix CVE-2026-44558?
Update to patched version: open-webui 0.9.0.
What is the CVSS score for CVE-2026-44558?
CVE-2026-44558 has a CVSS v3.1 base score of 5.4 (MEDIUM).
Technical Details
NVD Description
# Channel Access Grants Bypass filter_allowed_access_grants ## Affected Component Channel creation and update endpoints: - `backend/open_webui/routers/channels.py` (lines 291-340, `create_new_channel`) - `backend/open_webui/routers/channels.py` (lines 617-638, `update_channel_by_id`) - `backend/open_webui/models/channels.py` (lines 825-826, `set_access_grants` call without filtering) ## Affected Versions Current main branch (commit `6fdd19bf1`) and likely all versions supporting user-created group channels with access grants. ## Description All resource routers in Open WebUI (knowledge, models, notes, prompts, tools, skills) call `filter_allowed_access_grants()` before persisting access grants. This function strips `principal_id: "*"` wildcard grants from users who lack the relevant `sharing.public_*` permission, and strips individual user grants from users who lack `access_grants.allow_users` permission. The channel router does not call `filter_allowed_access_grants` on either create or update paths. A non-admin user who can create group channels (or who owns a channel) can submit arbitrary access grants — including public wildcard grants — and those grants are stored verbatim, bypassing the admin's permission framework. ```python # channels.py — access_grants from form data flow directly into persistence # No call to filter_allowed_access_grants() anywhere in these paths. # Compare with knowledge.py / models.py / notes.py / prompts.py / tools.py / skills.py, # all of which do: # form_data.access_grants = filter_allowed_access_grants(user, form_data.access_grants) # before creating or updating. ``` ## Attack Scenario 1. Admin configures permissions so that regular users do NOT have `sharing.public_channels` — public sharing of channels is intended to be admin-only. 2. Attacker (a regular user) creates or owns a group channel. 3. Attacker sends: ``` POST /api/v1/channels/ { "name": "public-channel", "type": "group", "access_control": { "access_grants": [ {"principal_type": "user", "principal_id": "*", "permission": "read"} ] } } ``` 4. `set_access_grants` is called directly without `filter_allowed_access_grants` — the wildcard grant is persisted. 5. The channel becomes publicly readable to every user on the instance, despite the admin's policy prohibiting public channels for regular users. The same attack works via `POST /api/v1/channels/{id}/update` for any channel the attacker owns. ## Impact - Regular users can bypass the `sharing.public_channels` permission and make channels publicly accessible - Regular users can bypass `access_grants.allow_users` to grant individual-user access in environments where only group-based sharing is intended - Admin's permission framework for channels is silently ineffective - Creates an inconsistency with every other resource type in the codebase, making the security posture harder to reason about ## Preconditions - Attacker must have an account with the ability to create group channels (default user capability), or ownership of an existing channel - Admin must have configured restrictive sharing permissions for regular users (otherwise there's no policy to bypass)
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 Analysis pending
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2026-44552 8.7 Analysis pending
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert