Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-64496


Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Versions 0.6.224 and prior contain a code injection vulnerability in the Direct Connections feature that allows malicious external model servers to execute arbitrary JavaScript in victim browsers via Server-Sent Event (SSE) execute events. This leads to authentication token theft, complete account takeover, and when chained with the Functions API, enables remote code execution on the backend server. The attack requires the victim to enable Direct Connections (disabled by default) and add the attacker's malicious model URL, achievable through social engineering of the admin and subsequent users. This issue is fixed in version 0.6.35.


Published

2025-11-08T02:15:35.443

Last Modified

2025-11-26T15:36:09.183

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.3 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-95
    CWE-501
    CWE-829
    CWE-830

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application openwebui open_webui < 0.6.35 Yes

References