Authentication mechanism absence or evasion In open-webui
Description
Open WebUI has an LDAP Empty Password Authentication Bypass
LDAP Empty Password Authentication Bypass
Affected Component
LDAP authentication endpoint:
backend/open_webui/routers/auths.py (lines 468-477, user bind with empty password)
backend/open_webui/models/auths.py (lines 58-60, LdapForm model)
Affected Versions
Current main branch (commit 6fdd19bf1) and likely all versions with LDAP authentication support.
Description
The LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against the LDAP server. Per RFC 4513 Section 5.1.2, a Simple Bind with a valid DN and an empty password constitutes an "unauthenticated simple authentication" — many LDAP servers (including OpenLDAP in default configuration and some Active Directory setups) return success (resultCode 0) for this operation.
The LdapForm Pydantic model accepts password: str with no minimum length constraint, so an empty string passes validation. The subsequent Connection.bind() call succeeds on vulnerable LDAP servers, and the application issues a full session token for the target user.
# models/auths.py:58-60 — no min_length on password class LdapForm(BaseModel): user: str password: str # auths.py:469-477 — empty password reaches LDAP bind connection_user = Connection( server,...
CVSS 3.1 Breakdown
Metric | Value | Rationale |
|---|---|---|
Attack Vector | Network (N) | Exploited remotely via the LDAP login endpoint |
Attack Complexity | Low (L) | Single request with an empty password field |
Privileges Required | None (N) | No prior authentication needed |
User Interaction | None (N) | No victim interaction required |
Scope | Unchanged (U) | Impact within the application's authentication boundary |
Confidentiality | High (H) | Full access to victim's account data — chats, files, API keys, settings |
Integrity | High (H) | Can modify victim's data, settings, send messages as victim |
Availability | None (N) | No direct denial of service |
Attack Scenario
LDAP authentication is enabled on the Open WebUI instance.
The underlying LDAP server accepts unauthenticated simple binds (OpenLDAP default, some AD configs).
Attacker sends:
POST /api/v1/auths/ldap {"user": "admin_username", "password": ""}
The app DN bind succeeds normally (line 366), finds the target user via LDAP search.
The user bind (line 469-477) sends a Simple Bind with the target's DN and an empty password.
The LDAP server returns success for the unauthenticated bind.
authenticate_user_by_email (line 507) issues a full session token for the target user.
Attacker has complete access to the victim's account.
Impact
Complete authentication bypass — any LDAP user account can be taken over without knowing the password
Includes admin accounts if they authenticate via LDAP
No rate limiting on the LDAP endpoint (unlike the password signin endpoint)
Zero interaction required from the victim
Preconditions
LDAP must be enabled (ENABLE_LDAP=True, disabled by default)
The LDAP server must accept unauthenticated simple binds with empty passwords (OpenLDAP default behavior, configurable on AD)
Attacker must know a valid LDAP username
Mitigation
Update Impact
Minimal update. May introduce new vulnerabilities or breaking changes.
Ecosystem | Package | Affected version | Patched versions |
|---|---|---|---|
pypi | open-webui | 0.9.0 |
Aliases
References