This WebUI vulnerability allows remote code execution – here’s how to stay safe


  • The exposed web interface contains CVE-2025-64496, a severe code injection vulnerability in the direct connect functionality.
  • Exploitation can lead to account takeover and RCE via malicious model URLs and API function chain.
  • Patch v0.6.35 adds middleware protection; users were urged to limit direct connections and control tool permissions

Open WebUI, a standalone open source web interface for interacting with local or remote AI language modelscontained a high-severity vulnerability that could allow account hijacking and, in some cases, remote code execution (RCE).

This was reported by Cato CTRL senior researcher Vitaly Simonovich, who in October 2025 disclosed a vulnerability that is now tracked as CVE-2025-64496.

Leave a Comment