Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.3

Open WebUI: Unauthorized access to server directory path

CVE-2026-28786
Summary

Open WebUI versions prior to 0.8.6 may leak the server's directory path, potentially exposing sensitive information. This is fixed in version 0.8.6, so update to the latest version to prevent disclosure. Non-admin users may be able to access the directory path, but it's not clear if they can use this information for malicious purposes.

Original title
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, an unsanitized filename field in the speech-to-text transcription endpoint...
Original description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, an unsanitized filename field in the speech-to-text transcription endpoint allows any authenticated non-admin user to trigger a `FileNotFoundError` whose message — including the server's absolute `DATA_DIR` path — is returned verbatim in the HTTP 400 response body, confirming information disclosure on all default deployments. Version 0.8.6 patches the issue.
nvd CVSS3.1 4.3
Vulnerability type
CWE-22 Path Traversal
CWE-209
Published: 27 Mar 2026 · Updated: 27 Mar 2026 · First seen: 27 Mar 2026