This WebUI vulnerability allows remote code execution – here’s how to stay safe


  • Open WebUI carried CVE-2025-64496, a high severity code injection vulnerability in Direct Connection functions
  • Exploitation could enable account takeover and RCE via malicious model URLs and Functions API chains
  • Patch v0.6.35 adds middleware protection; users are encouraged to limit direct connections and monitor tool permissions

Open WebUI, an open source, self-hosted web interface for interacting with local or remote AI language models, carried a serious vulnerability that allowed account takeover and, in some cases, remote code execution (RCE).

This is according to Cato CTRL Senior Security Researcher Vitaly Simonovich, who in October 2025 disclosed a vulnerability now tracked as CVE-2025-64496.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top