Plattform
other
Komponente
open-webui
Behoben in
0.6.38
CVE-2025-65958 describes a Server-Side Request Forgery (SSRF) vulnerability discovered in Open WebUI, a self-hosted offline AI platform. This vulnerability allows authenticated users to manipulate the server into making HTTP requests to arbitrary URLs, potentially exposing sensitive information and internal resources. The vulnerability impacts versions of Open WebUI prior to 0.6.37 and has been resolved in version 0.6.37.
The SSRF vulnerability in Open WebUI poses a significant risk because it allows attackers to bypass security controls and access resources that should be protected. An attacker could leverage this vulnerability to access cloud metadata endpoints (AWS, GCP, Azure), revealing sensitive credentials and configuration data. Internal network scanning becomes possible, enabling reconnaissance and identification of vulnerable internal services. Furthermore, the attacker can potentially exfiltrate sensitive data stored within the Open WebUI instance or accessible through internal services. The impact is amplified by the fact that only basic authentication is required to exploit this flaw, making it accessible to a wide range of attackers.
CVE-2025-65958 was publicly disclosed on December 4, 2025. The vulnerability's ease of exploitation, combined with the potential for significant data exposure, suggests a medium probability of exploitation. No public proof-of-concept (PoC) code has been released at the time of writing, but the SSRF nature of the vulnerability makes it likely that PoCs will emerge. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns.
Organizations deploying Open WebUI in environments with sensitive data or cloud integrations are particularly at risk. Shared hosting environments where multiple users share the same Open WebUI instance are also vulnerable, as a compromised user account could be used to exploit the SSRF vulnerability and impact other users. Any deployment using legacy configurations or outdated network security policies is also at increased risk.
• linux / server: Monitor Open WebUI logs for unusual outbound HTTP requests. Use journalctl -u open-webui to filter for requests to unexpected domains or IP addresses.
journalctl -u open-webui | grep -i "http:" | grep -v "localhost"• generic web: Use curl or wget to test outbound connectivity from the Open WebUI server. Attempt to connect to a known safe external URL and verify that the connection is successful. Examine access and error logs for suspicious patterns.
curl -v https://example.com 2>&1 | grep -i "connection:" disclosure
Exploit-Status
EPSS
0.04% (12% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-65958 is to immediately upgrade Open WebUI to version 0.6.37 or later. If upgrading is not immediately feasible due to compatibility issues or system downtime constraints, consider implementing temporary workarounds. These may include restricting outbound network access from the Open WebUI server using a firewall or proxy server, allowing only connections to trusted domains. Additionally, implement strict input validation on any user-supplied URLs to prevent malicious redirection. After upgrading, verify the fix by attempting to trigger an SSRF request to an external URL; the request should be blocked or result in an error.
Aktualisieren Sie Open WebUI auf Version 0.6.37 oder höher. Diese Version behebt die SSRF-Schwachstelle, die authentifizierten Benutzern das Senden von HTTP-Anfragen an beliebige URLs ermöglicht, wodurch das Risiko des Zugriffs auf Cloud-Metadaten, das Scannen interner Netzwerke und die Exfiltration sensibler Informationen gemindert wird.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-65958 is a Server-Side Request Forgery vulnerability in Open WebUI versions prior to 0.6.37, allowing authenticated users to make arbitrary HTTP requests.
You are affected if you are running Open WebUI version 0.6.37 or earlier. Immediately check your version and upgrade if necessary.
Upgrade Open WebUI to version 0.6.37 or later. As a temporary workaround, restrict outbound network access using a firewall or proxy server.
While no active exploitation has been confirmed, the vulnerability's ease of exploitation suggests a potential for exploitation. Monitor security advisories for updates.
Refer to the Open WebUI project's official website and GitHub repository for the latest security advisories and release notes.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.