GHSA-9VVH-QMJX-P4Q8
Vulnerability from github – Published: 2026-05-08 19:45 – Updated: 2026-05-08 19:45Base Model Routing Bypasses Access Control via Model Chaining
Affected Component
Model chaining via base_model_id:
- backend/open_webui/routers/models.py (lines 170-214, create_new_model)
- backend/open_webui/routers/models.py (lines 254-308, import_models)
- backend/open_webui/main.py (lines 1696-1711, base model resolution in chat completion)
- backend/open_webui/routers/openai.py (lines 1032-1037, base model payload rewrite)
- backend/open_webui/routers/ollama.py (lines 1086-1090, base model payload rewrite)
- backend/open_webui/utils/models.py (line 380, check_model_access — checks user-facing model only)
Affected Versions
Current main branch (commit 6fdd19bf1) and likely all versions with the model chaining (base_model_id) feature.
Description
Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing base model (e.g., "gpt-4-turbo-restricted") that provides the actual inference capability. When a user queries the composed model, the access control pipeline verifies the user has access to the composed model but never re-verifies access to the chained base model.
Additionally, the model creation and import endpoints accept arbitrary base_model_id values without checking that the caller has access to that base model. Combined, this allows any user with the default model creation permission to create a model that chains to a restricted base model — and then invoke it, causing the server to dispatch the request to the restricted base model using the admin-configured API key.
# utils/models.py:380 — access check runs against the user-facing model only
def check_model_access(user, model):
if user.role == 'user':
...check access grants on `model`...
# main.py:1696-1711 — base model resolved without access check
base_model = request.app.state.MODELS.get(model.info.base_model_id)
if base_model:
# payload["model"] is rewritten to base_model.id
# but no check_model_access(user, base_model) is performed
# openai.py:1032-1037 / ollama.py:1086-1090 — the rewritten payload is dispatched
payload['model'] = base_model_id
Attack Scenario
- Admin provisions a premium/restricted model
gpt-4-turbo-restrictedand configures access grants so only the "ML Engineers" group can use it. - Attacker (a regular user not in that group) calls:
POST /api/v1/models/create { "id": "cheap-assistant", "name": "Cheap Assistant", "base_model_id": "gpt-4-turbo-restricted", "params": {}, "meta": {} }The creation endpoint does not validate the attacker's access togpt-4-turbo-restricted. - Attacker now owns
cheap-assistant.check_model_access(attacker, cheap-assistant)passes trivially because they are the owner. - Attacker sends:
POST /api/chat/completions {"model": "cheap-assistant", "messages": [...]} - At
main.py:1696, the pipeline resolvescheap-assistant.base_model_idtogpt-4-turbo-restricted, rewritespayload["model"]to the base model ID, and dispatches the upstream request with the admin-configured API key for the backend. - The attacker receives responses from the restricted model, bypassing the access grant policy.
The same bypass is available via the import endpoint, which additionally allows overwriting existing models (see related finding on model import ownership).
Impact
- Regular users can query restricted models by chaining through a self-owned wrapper model
- Access control on
gpt-4-turbo-restricted(or equivalent paid/tiered/internal models) becomes silently ineffective - Direct cost impact on pay-per-token backends (OpenAI, Anthropic, Azure) — the admin's API key is used for requests the admin intended to forbid
- Creates a false sense of security — the admin sees access restrictions work through the standard model selector but not through user-created chains
Preconditions
- Attacker must have model creation permission (default
workspace.modelspermission, granted to all users by default) - A restricted base model must exist on the instance (the target of the chain)
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 0.8.12"
},
"package": {
"ecosystem": "PyPI",
"name": "open-webui"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-44555"
],
"database_specific": {
"cwe_ids": [
"CWE-862"
],
"github_reviewed": true,
"github_reviewed_at": "2026-05-08T19:45:03Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "# Base Model Routing Bypasses Access Control via Model Chaining\n\n## Affected Component\n\nModel chaining via `base_model_id`:\n- `backend/open_webui/routers/models.py` (lines 170-214, `create_new_model`)\n- `backend/open_webui/routers/models.py` (lines 254-308, `import_models`)\n- `backend/open_webui/main.py` (lines 1696-1711, base model resolution in chat completion)\n- `backend/open_webui/routers/openai.py` (lines 1032-1037, base model payload rewrite)\n- `backend/open_webui/routers/ollama.py` (lines 1086-1090, base model payload rewrite)\n- `backend/open_webui/utils/models.py` (line 380, `check_model_access` \u2014 checks user-facing model only)\n\n## Affected Versions\n\nCurrent main branch (commit `6fdd19bf1`) and likely all versions with the model chaining (`base_model_id`) feature.\n\n## Description\n\nOpen WebUI supports model composition via `base_model_id`: a user-defined model (e.g., \"Cheap Assistant\") can reference an existing base model (e.g., \"gpt-4-turbo-restricted\") that provides the actual inference capability. When a user queries the composed model, the access control pipeline verifies the user has access to the composed model but never re-verifies access to the chained base model.\n\nAdditionally, the model creation and import endpoints accept arbitrary `base_model_id` values without checking that the caller has access to that base model. Combined, this allows any user with the default model creation permission to create a model that chains to a restricted base model \u2014 and then invoke it, causing the server to dispatch the request to the restricted base model using the admin-configured API key.\n\n```python\n# utils/models.py:380 \u2014 access check runs against the user-facing model only\ndef check_model_access(user, model):\n if user.role == \u0027user\u0027:\n ...check access grants on `model`...\n\n# main.py:1696-1711 \u2014 base model resolved without access check\nbase_model = request.app.state.MODELS.get(model.info.base_model_id)\nif base_model:\n # payload[\"model\"] is rewritten to base_model.id\n # but no check_model_access(user, base_model) is performed\n\n# openai.py:1032-1037 / ollama.py:1086-1090 \u2014 the rewritten payload is dispatched\npayload[\u0027model\u0027] = base_model_id\n```\n\n## Attack Scenario\n\n1. Admin provisions a premium/restricted model `gpt-4-turbo-restricted` and configures access grants so only the \"ML Engineers\" group can use it.\n2. Attacker (a regular user not in that group) calls:\n ```\n POST /api/v1/models/create\n {\n \"id\": \"cheap-assistant\",\n \"name\": \"Cheap Assistant\",\n \"base_model_id\": \"gpt-4-turbo-restricted\",\n \"params\": {},\n \"meta\": {}\n }\n ```\n The creation endpoint does not validate the attacker\u0027s access to `gpt-4-turbo-restricted`.\n3. Attacker now owns `cheap-assistant`. `check_model_access(attacker, cheap-assistant)` passes trivially because they are the owner.\n4. Attacker sends:\n ```\n POST /api/chat/completions\n {\"model\": \"cheap-assistant\", \"messages\": [...]}\n ```\n5. At `main.py:1696`, the pipeline resolves `cheap-assistant.base_model_id` to `gpt-4-turbo-restricted`, rewrites `payload[\"model\"]` to the base model ID, and dispatches the upstream request with the admin-configured API key for the backend.\n6. The attacker receives responses from the restricted model, bypassing the access grant policy.\n\nThe same bypass is available via the import endpoint, which additionally allows overwriting existing models (see related finding on model import ownership).\n\n## Impact\n\n- Regular users can query restricted models by chaining through a self-owned wrapper model\n- Access control on `gpt-4-turbo-restricted` (or equivalent paid/tiered/internal models) becomes silently ineffective\n- Direct cost impact on pay-per-token backends (OpenAI, Anthropic, Azure) \u2014 the admin\u0027s API key is used for requests the admin intended to forbid\n- Creates a false sense of security \u2014 the admin sees access restrictions work through the standard model selector but not through user-created chains\n\n## Preconditions\n\n- Attacker must have model creation permission (default `workspace.models` permission, granted to all users by default)\n- A restricted base model must exist on the instance (the target of the chain)",
"id": "GHSA-9vvh-qmjx-p4q8",
"modified": "2026-05-08T19:45:03Z",
"published": "2026-05-08T19:45:03Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-9vvh-qmjx-p4q8"
},
{
"type": "PACKAGE",
"url": "https://github.com/open-webui/open-webui"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"type": "CVSS_V3"
}
],
"summary": "Open WebUI\u0027s Base Model Routing Bypasses Access Control via Model Chaining"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.