Security Overview
Our primary goal is to ensure the protection and confidentiality of sensitive data stored by users on Open WebUI.Open WebUI is designed as a self-hosted, authenticated platform with extensible role-based access control architecture.
Supported Versions
| Version (Branch) | Supported |
|---|---|
| main | ✅ Supported |
| dev | ❌ Not Supported |
| others | ❌ Not Supported |
Security Best Practices
Authentication & Access Control
Role-Based Access Control (RBAC)Deployment Security
Database Security Network SecurityThe backend reverse proxy design prevents direct exposure of the Ollama API to the frontend, safeguarding against CORS issues and unauthorized access.
Monitoring & Observability
Enable Logging Audit Logging Enable audit logs to track user actions:- Traces
- Metrics
- Logs
Configuration Security
Default Configuration TestingFunction & Tool Security
Admin Control Automatic Dependency InstallationReporting a Vulnerability
Requirements for Valid Reports
1. Must Be a Real Vulnerability
1. Must Be a Real Vulnerability
A security vulnerability is an exploitable weakness where the system behaves in an unintended way, allowing attackers to:
- Bypass security controls
- Gain unauthorized access
- Execute arbitrary code
- Escalate privileges
2. No Vague Reports
2. No Vague Reports
Submissions such as “I found a vulnerability” without details will be treated as spam and rejected.
3. In-Depth Understanding Required
3. In-Depth Understanding Required
Reports must reflect a clear understanding of:
- The codebase
- How Open WebUI is used
- Specific details about the vulnerability
- Affected components
- Potential impacts
4. Proof of Concept (PoC) is Mandatory
4. Proof of Concept (PoC) is Mandatory
Each submission must include a well-documented PoC that demonstrates:
- What security boundary was crossed
- How the vulnerability is triggered/abused
- What actions the attacker can perform
- What data/action becomes possible that should not be
- Exact reproduction steps (copy/paste runnable where possible)
5. Remediation Required
5. Remediation Required
Along with the PoC, you must provide either:
- A patch/PR, OR
- A remediation plan with actionable steps
- The likely root cause
- Location(s) to change
- Recommended fix approach
- Security tradeoffs or potential regressions
6. Default Configuration Testing
6. Default Configuration Testing
All vulnerability reports must be tested using Open WebUI’s default configuration. Claims that only work with weakened security settings may be discarded.
7. Threat Model Understanding
7. Threat Model Understanding
Reports must demonstrate understanding of Open WebUI’s self-hosted, authenticated, role-based access control architecture.
8. CVSS Scoring Accuracy
8. CVSS Scoring Accuracy
If you include a CVSS score, it must accurately reflect the vulnerability. Intentionally inflated scores may result in report rejection.
9. Admin Actions Are Out of Scope
9. Admin Actions Are Out of Scope
Vulnerabilities requiring an administrator to actively perform unsafe actions are NOT valid. Admins have full system control and are expected to understand security implications.
10. AI Report Transparency
10. AI Report Transparency
You MUST DISCLOSE if AI was used in any capacity - whether for writing the report, generating the PoC, or identifying the vulnerability.
Where to Report
Report a Vulnerability
Open a vulnerability report on GitHub Security Advisories
Non-Vulnerability Security Concerns
If your concern is security-related but NOT a vulnerability, use these channels:Documentation
Documentation issues or improvement ideas
Feature Requests
Security feature requests and enhancements
Configuration Help
Ask the community for guidance
General Issues
Bug reports and general issues
- Suggestions for better default configuration values
- Security hardening recommendations
- Deployment best practices guidance
- Unclear configuration instructions
- Need for additional security documentation
- Feature requests for optional security enhancements (2FA, audit logging, etc.)
- General security questions about production deployment
Security Audits
We regularly audit our internal processes and system architecture for vulnerabilities using a combination of automated and manual testing techniques. We are also planning to implement SAST and SCA scans in our project.
Enterprise Security
For enterprise deployments requiring enhanced security features:Enterprise Plan
Get custom theming, SLA support, and Long-Term Support (LTS) versions
Last updated: 2026-02-25