More

    This WebUI vulnerability allows remote code execution – here’s how to stay safe



    • Open WebUI carried CVE-2025-64496, a high-severity code injection flaw in Direct Connection features
    • Exploitation could enable account takeover and RCE via malicious model URLs and Functions API chaining
    • Patch v0.6.35 adds middleware protections; users urged to restrict Direct Connections and monitor tool permissions

    Open WebUI, an open-source, self-hosted web interface for interacting with local or remote AI language models, carried a high-severity vulnerability that enabled account takeover and, in some cases, remote code execution (RCE), as well.

    This is according to Cato CTRL Senior Security Researcher Vitaly Simonovich who, in October 2025, disclosed a vulnerability that is now tracked as CVE-2025-64496.


    https://cdn.mos.cms.futurecdn.net/Hc6oTvWTHfb3ETNovTaDxG-1920-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img