Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.4

Open WebUI Cross-Site Scripting (XSS) Through Chat History

CVE-2026-26192
Summary

Open WebUI, a self-hosted AI platform, had a security issue where malicious code could be injected into chat history. This allowed attackers to execute code on users' devices when viewing shared chats. The issue was fixed in version 0.7.0, so update to this version or later to protect your system.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
openwebui open_webui <= 0.7.0 –
Original title
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.7.0, aanually modifying chat history allows setting the `html` property within ...
Original description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.7.0, aanually modifying chat history allows setting the `html` property within document metadata. This causes the frontend to enter a code path that treats document contents as HTML, and render them in an iFrame when the citation is previewed. This allows stored XSS via a weaponized document payload in a chat. The payload also executes when the citation is viewed on a shared chat. Version 0.7.0 fixes the issue.
nvd CVSS3.1 5.4
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026