This WebUI vulnerability allows remote code execution – here’s how to stay safe

This WebUI vulnerability allows remote code execution – here’s how to stay safe

Tech



  • Open WebUI carried CVE-2025-64496, a high-severity code injection flaw in Direct Connection features
  • Exploitation could enable account takeover and RCE via malicious model URLs and Functions API chaining
  • Patch v0.6.35 adds middleware protections; users urged to restrict Direct Connections and monitor tool permissions

Open WebUI, an open-source, self-hosted web interface for interacting with local or remote AI language models, carried a high-severity vulnerability that enabled account takeover and, in some cases, remote code execution (RCE), as well.

This is according to Cato CTRL Senior Security Researcher Vitaly Simonovich who, in October 2025, disclosed a vulnerability that is now tracked as CVE-2025-64496.





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *