Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-45387
Published:May 15, 2026
Updated:May 18, 2026
Summary When setting model permissions so that a group has read access to it, intending for other users to use it, those users also can read the model's system prompt. However users may consider their system prompt confidential, so we consider this a security issue. Compare https://genai.owasp.org/llmrisk/llm072025-system-prompt-leakage/ or prompt injections to get popular chatbots on the internet to reveal their prompt. Details We discovered that users can open the workspace model edit page /workspace/models/edit?id=notmymodel for models that do not appear in their workspace. Saving is not possible, that permission check is correct. On the API level: - "/api/v1/models/model?id=notmymodel" -> returns the model details, most importantly params.system - even though "/api/v1/models/list" does NOT contain the model since it checks for write permission. - "/api/models" contains the model correctly and does not reveal the system prompt. It seems inconsistent that the REST API list does not contain an item, but if you know the id, you can access it anyway. PoC - create model - give read permission to group with another user - other user can access "/api/v1/models/model?id=notmymodel" Impact System prommpt leakage If this is intended behavior for the "read" permission, maybe there should be an additional "use" permission (which would be 99% of use cases of the read permission i believe).
Affected Packages
https://github.com/open-webui/open-webui.git (GITHUB):
Affected version(s) >=v0.1.102 <v0.9.5
Fix Suggestion:
Update to version v0.9.5
Do you need more information?
Contact Us
CVSS v4
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
4.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Exposure of Sensitive Information to an Unauthorized Actor
EPSS
Base Score:
0.02