CVE-2026-44559

GHSA-c7wp-3qh5-55pv MEDIUM
Published May 8, 2026

# Missing Access Check on Channel Members Endpoint for Standard Channels ## Affected Component Channel members listing endpoint: - `backend/open_webui/routers/channels.py` (lines 445-507, `get_channel_members_by_id`) ## Affected Versions Current main branch and likely all versions with the...

Full CISO analysis pending enrichment.

Affected Systems

Package Ecosystem Vulnerable Range Patched
open-webui pip <= 0.8.12 0.9.0
135.3K Pushed 8d ago 58% patched ~9d to patch Full package profile →

Do you use open-webui? You're affected.

Severity & Risk

CVSS 3.1
4.3 / 10
EPSS
N/A
Exploitation Status
No known exploitation
Sophistication
N/A

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR Low
UI None
S Unchanged
C Low
I None
A None

Recommended Action

Patch available

Update open-webui to version 0.9.0

Compliance Impact

Compliance analysis pending. Sign in for full compliance mapping when available.

Frequently Asked Questions

What is CVE-2026-44559?

Open WebUI Missing Access Check on Channel Members Endpoint for Standard Channels

Is CVE-2026-44559 actively exploited?

No confirmed active exploitation of CVE-2026-44559 has been reported, but organizations should still patch proactively.

How to fix CVE-2026-44559?

Update to patched version: open-webui 0.9.0.

What is the CVSS score for CVE-2026-44559?

CVE-2026-44559 has a CVSS v3.1 base score of 4.3 (MEDIUM).

Technical Details

NVD Description

# Missing Access Check on Channel Members Endpoint for Standard Channels ## Affected Component Channel members listing endpoint: - `backend/open_webui/routers/channels.py` (lines 445-507, `get_channel_members_by_id`) ## Affected Versions Current main branch and likely all versions with the channels feature. ## Description The `GET /api/v1/channels/{id}/members` endpoint only checks membership for `group` and `dm` channel types (lines 467-469). For standard channels — including private ones — there is no `channel_has_access` check before returning the member list. Any authenticated user who knows a private channel's UUID can enumerate all users with access to that channel. ```python # Line 467-469: only group/dm channels are checked if channel.type in ['group', 'dm']: if not Channels.is_user_channel_member(channel.id, user.id, db=db): raise HTTPException(...) # Standard channels fall through with NO access check ``` Compare with other channel endpoints (e.g., `get_channel_messages` at line 688) which correctly call `channel_has_access(user.id, channel, permission='read')` for standard channels. ## CVSS 3.1 Breakdown | Metric | Value | Rationale | |--------|-------|-----------| | Attack Vector | Network (N) | Exploited remotely via API call | | Attack Complexity | Low (L) | Single API call, no special conditions | | Privileges Required | Low (L) | Requires a valid user account | | User Interaction | None (N) | No victim interaction required | | Scope | Unchanged (U) | Impact is within the channel authorization boundary | | Confidentiality | Low (L) | Leaks user identities and details for a private channel | | Integrity | None (N) | No data modification | | Availability | None (N) | No denial of service | ## Attack Scenario 1. Attacker obtains a private standard channel's UUID (via logs, browser history, URL observation, or other API responses). 2. Attacker calls `GET /api/v1/channels/{id}/members`. 3. The server returns the full list of permitted users including their IDs, names, emails, roles, and profile images. 4. The attacker has no access to the channel's messages (those endpoints check access correctly), but now knows exactly who does. ## Impact - Leaks the identity and personal details of every user with access to a private channel - Reveals organizational structure and project assignments - Enables targeted social engineering against channel members ## Preconditions - Channels feature must be enabled (disabled by default) - Attacker must know the channel UUID (not guessable, but obtainable through indirect means)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Timeline

Published
May 8, 2026
Last Modified
May 8, 2026
First Seen
May 8, 2026

Related Vulnerabilities