mirror of
https://github.com/open-webui/open-webui.git
synced 2026-05-07 19:38:46 -05:00
[GH-ISSUE #23446] issue: Critical and High severity vulnerabilities #35514
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Haritha-Ashok16 on GitHub (Apr 6, 2026).
Original GitHub issue: https://github.com/open-webui/open-webui/issues/23446
Check Existing Issues
Installation Method
Git Clone
Open WebUI Version
na
Ollama Version (if applicable)
No response
Operating System
macos/windows
Browser (if applicable)
No response
Confirmation
README.md.Expected Behavior
na
Actual Behavior
na
Steps to Reproduce
na
Logs & Screenshots
na
Additional Information
36.node-tar is Vulnerable to Arbitrary File Overwrite and Symlink Poisoning via Insufficient Path Sanitization , Remediation: 7.5.3
High Vulnerability identified in
Description: high Vulnerability identified in ffmpeg
@Classic298 commented on GitHub (Apr 6, 2026):
This is a scanner output, not a security report. Every field in the issue template is filled with "na" including reproduction steps, and you checked the box saying you documented step-by-step reproduction instructions.
None of these have been analyzed for reachability. A CVE in a transitive dependency doesn't mean Open WebUI is vulnerable — it means that dependency has a known issue in some usage pattern.
Unless user input in Open WebUI actually reaches the vulnerable code path, there's nothing to exploit.
Some of these will be resolved with routine dependency bumps. If you believe any specific one is exploitable through Open WebUI's actual attack surface, demonstrate the exploit path and report it through our security policy — not as a public issue.
Closing this. Please don't paste raw scanner output as bug reports.