Skip to main content

CVE-2026-0767

CVE IDCVE-2026-0767
Vendor DispositionRejected — not a vulnerability
Published2026-01-23
Issuing CNAZero Day Initiative (ZDI-26-033)
Claimed SeverityMedium (CVSS 6.5 — CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CWECWE-319 (Cleartext Transmission of Sensitive Information)

What the CVE Claims

User credentials (email and password) submitted to Open WebUI's login endpoint are transmitted in cleartext if the application is deployed over plain HTTP rather than HTTPS, allowing a network-adjacent attacker to intercept them.


Why This Is Not a Vulnerability

This describes a property of the HTTP protocol, not a defect in Open WebUI. An unencrypted HTTP request is, by definition, not encrypted — this applies to every web application ever built.

Open WebUI is a backend application that exposes an HTTP interface. Whether that interface is exposed directly, behind a TLS-terminating reverse proxy, behind a load balancer with TLS, or via a managed platform, is the operator's deployment decision. The application does not, and is not expected to, mandate transport-layer configuration. The description is functionally equivalent to stating "if the operator deploys Apache HTTPD without HTTPS, login credentials are sent in cleartext" — a true statement that does not constitute a vulnerability in Apache.

CVSS Accuracy

The CVSS vector itself acknowledges the impracticality: AV:A (Adjacent Network) and AC:H (High Attack Complexity) reflect that the scenario requires both an unencrypted deployment and a network-adjacent attacker positioned to intercept traffic. In any conventional production deployment behind TLS termination, the scenario does not arise.

Applicable Security Policy Rules

  • Rule 1: Expected protocol behavior is not a vulnerability. HTTP's cleartext property is the textbook example.
  • Rule 6: The scenario manifests only when the operator deploys without TLS — not a property of Open WebUI's default configuration.
  • Rule 7: The report mischaracterizes a deployment-layer property as an application-layer defect.

Impact to Users

No action required, provided your deployment uses TLS. If you are running Open WebUI over plain HTTP in production, configure TLS termination via a reverse proxy — standard deployment hygiene for any web application, not a response to this CVE. See our HTTPS and Reverse Proxy Configuration guide.


References

This content is for informational purposes only and does not constitute a warranty, guarantee, or contractual commitment. Open WebUI is provided "as is." See your license for applicable terms.