mirror of
https://github.com/open-webui/open-webui.git
synced 2026-05-06 19:08:59 -05:00
[PR #24214] [CLOSED] fix: the jwt token validation in auth in auth.py #50555
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/open-webui/open-webui/pull/24214
Author: @orbisai0security
Created: 4/29/2026
Status: ❌ Closed
Base:
main← Head:fix-v-002-jwt-algorithm-enforcement📝 Commits (1)
e10e10ffix: V-002 security vulnerability📊 Changes
1 file changed (+7 additions, -2 deletions)
View changed files
📝
backend/open_webui/utils/auth.py(+7 -2)📄 Description
Summary
Fix critical severity security issue in
backend/open_webui/utils/auth.py.Vulnerability
V-002backend/open_webui/utils/auth.py:210Description: The JWT token validation in auth.py:210-216 may not explicitly enforce the signing algorithm, potentially allowing the 'none' algorithm attack where an attacker strips the signature and sets alg=none to forge arbitrary claims. The OAuth flow in oauth.py:1822 issues JWTs through a potentially different code path, creating inconsistent validation. If the JWT secret key is weak or derived from predictable values, tokens can be brute-forced offline using tools like hashcat.
Changes
backend/open_webui/utils/auth.pyVerification
Automated security fix by OrbisAI Security
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.