mirror of
https://github.com/open-webui/open-webui.git
synced 2026-05-07 11:28:35 -05:00
[PR #23253] [CLOSED] fix: the ldap authentication search filter concatena... in auths.py #50152
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/open-webui/open-webui/pull/23253
Author: @orbisai0security
Created: 3/31/2026
Status: ❌ Closed
Base:
main← Head:fix-fix-ldap-search-filters-injection-v001📝 Commits (1)
622372dfix: the ldap authentication search filter concatena... in auths.py📊 Changes
1 file changed (+21 additions, -0 deletions)
View changed files
📝
backend/open_webui/routers/auths.py(+21 -0)📄 Description
Summary
Fix critical severity security issue in
backend/open_webui/routers/auths.py.Vulnerability
V-001backend/open_webui/routers/auths.py:386Description: The LDAP authentication search filter concatenates the LDAP_SEARCH_FILTERS configuration value directly into the search filter string using an f-string without validation or escaping. While the username is properly escaped using escape_filter_chars(), the LDAP_SEARCH_FILTERS value loaded from environment variables is concatenated without sanitization. An attacker who can control the LDAP_SEARCH_FILTER or LDAP_SEARCH_FILTERS environment variable can inject arbitrary LDAP filter syntax to bypass authentication or extract sensitive directory information.
Changes
backend/open_webui/routers/auths.pyVerification
Automated security fix by OrbisAI Security
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.