The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-28786

CVE-2026-28786: Open WebUI Information Disclosure Flaw

CVE-2026-28786 is an information disclosure vulnerability in Open WebUI that exposes server path information through unsanitized filename inputs. This article covers the technical details, affected versions, and mitigation.

Published: April 3, 2026

CVE-2026-28786 Overview

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, the speech-to-text transcription endpoint contains an unsanitized filename field that allows any authenticated non-admin user to trigger a FileNotFoundError. The error message, including the server's absolute DATA_DIR path, is returned verbatim in the HTTP 400 response body, resulting in information disclosure on all default deployments. This path traversal vulnerability (CWE-22) enables attackers to enumerate server directory structures and gather reconnaissance information for further attacks.

Critical Impact

Authenticated users can extract sensitive server path information, potentially exposing deployment configurations and aiding in subsequent attack planning against the Open WebUI infrastructure.

Affected Products

  • Open WebUI versions prior to 0.8.6
  • All default Open WebUI deployments with speech-to-text functionality enabled
  • Self-hosted AI platforms running vulnerable Open WebUI instances

Discovery Timeline

  • 2026-03-27 - CVE-2026-28786 published to NVD
  • 2026-03-30 - Last updated in NVD database

Technical Details for CVE-2026-28786

Vulnerability Analysis

The vulnerability resides in Open WebUI's speech-to-text transcription endpoint, which processes user-supplied filename parameters without proper sanitization. When an authenticated user submits a malformed or non-existent filename, the application generates a Python FileNotFoundError exception. Rather than returning a generic error message, the exception handler exposes the full error context, including the absolute filesystem path where the application stores its data (DATA_DIR).

This information disclosure affects all default deployments because the error handling behavior is consistent across installations. Any authenticated user, regardless of their privilege level, can exploit this vulnerability to confirm the server's directory structure and data storage locations.

Root Cause

The root cause is improper input validation and overly verbose error handling in the speech-to-text endpoint. The filename parameter is passed directly to file system operations without sanitization, and when operations fail, the exception message containing sensitive path information is returned to the client without filtering. This violates the security principle of providing minimal error information to end users while logging detailed errors server-side.

Attack Vector

The attack is network-based and requires only authenticated access to the Open WebUI platform. An attacker with standard user credentials can craft HTTP requests to the speech-to-text transcription endpoint with specially crafted filename values designed to trigger file-not-found errors. The attack flow is as follows:

  1. Authenticate to Open WebUI with any valid user account
  2. Submit a request to the speech-to-text endpoint with a non-existent or malformed filename
  3. Observe the HTTP 400 response containing the FileNotFoundError message
  4. Extract the absolute DATA_DIR path from the error response

The disclosed path information can then be used for reconnaissance to understand the server's filesystem layout, potentially identifying additional attack surfaces or sensitive configuration files.

Detection Methods for CVE-2026-28786

Indicators of Compromise

  • Unusual patterns of HTTP 400 responses from the speech-to-text transcription endpoint
  • Multiple failed file access attempts from the same authenticated user session
  • Log entries showing FileNotFoundError exceptions with path traversal sequences
  • Repeated requests to the transcription API with intentionally malformed filenames

Detection Strategies

  • Monitor application logs for FileNotFoundError exceptions in the speech-to-text module
  • Implement alerting on unusual volumes of HTTP 400 responses from API endpoints
  • Deploy web application firewall (WAF) rules to detect path traversal patterns in request parameters
  • Review authentication logs for accounts making repeated failed API requests

Monitoring Recommendations

  • Enable verbose logging for the speech-to-text endpoint to capture request parameters
  • Configure SIEM rules to correlate authentication events with subsequent API errors
  • Establish baseline metrics for transcription endpoint error rates to identify anomalies
  • Monitor for reconnaissance patterns that may indicate pre-attack information gathering

How to Mitigate CVE-2026-28786

Immediate Actions Required

  • Upgrade Open WebUI to version 0.8.6 or later immediately
  • Review application logs for evidence of exploitation attempts
  • Audit user accounts that have accessed the speech-to-text functionality
  • Consider implementing additional access controls for sensitive API endpoints

Patch Information

Open WebUI version 0.8.6 addresses this vulnerability by implementing proper input sanitization for the filename field and ensuring error messages do not expose sensitive server path information. Organizations should update to this version or later as soon as possible. For detailed patch information, refer to the GitHub Security Advisory.

Workarounds

  • Restrict access to the speech-to-text endpoint to trusted users only until patching is complete
  • Implement a reverse proxy or WAF rule to sanitize filename parameters before they reach the application
  • Configure custom error pages to prevent verbose error messages from reaching clients
  • Disable the speech-to-text functionality temporarily if not essential to operations
bash
# Example: Restrict speech-to-text endpoint access in nginx reverse proxy
location /api/v1/audio/transcriptions {
    # Allow only specific trusted IP addresses
    allow 10.0.0.0/8;
    deny all;
    
    # Proxy to Open WebUI backend
    proxy_pass http://localhost:8080;
    proxy_intercept_errors on;
    error_page 400 = @custom_error;
}

location @custom_error {
    return 400 '{"error": "Request could not be processed"}';
    add_header Content-Type application/json;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechOpenwebui

  • SeverityMEDIUM

  • CVSS Score4.3

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-22
  • Vendor Resources
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-29071: Open WebUI Information Disclosure Flaw

  • CVE-2026-28788: Open WebUI Privilege Escalation Flaw

  • CVE-2025-64496: Open WebUI Code Injection RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English