Inclusion of Web Functionality from an Untrusted Source Affecting open-webui package, versions [0.5.11,0.6.35)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.12% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-OPENWEBUI-13863430
  • published9 Nov 2025
  • disclosed7 Nov 2025
  • creditvitalysim

Introduced: 7 Nov 2025

NewCVE-2025-64496  (opens in a new tab)
CWE-501  (opens in a new tab)
CWE-829  (opens in a new tab)
CWE-830  (opens in a new tab)
CWE-95  (opens in a new tab)

How to fix?

Upgrade open-webui to version 0.6.35 or higher.

Overview

open-webui is an Open WebUI

Affected versions of this package are vulnerable to Inclusion of Web Functionality from an Untrusted Source via the execute event handler used by the Direct Connections feature. An attacker can gain access to authentication tokens, take over user accounts, and execute arbitrary code on the backend server by tricking an administrator into enabling Direct Connections and adding a malicious external model server.

Notes:

  • This is only exploitable if the Direct Connections feature is enabled and a connection to an untrusted external model server is added.

  • The "Direct Connections" feature was added in version 0.5.11

References

CVSS Base Scores

version 4.0
version 3.1