Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Hospitality Sector Hit By PHALT#BLYX ClickFix Malware Campaign

January 6, 2026

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

January 6, 2026

High-Severity Flaw in Open WebUI Affects AI Connections

January 6, 2026
Facebook X (Twitter) Instagram
Tuesday, January 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»High-Severity Flaw in Open WebUI Affects AI Connections
Cyber Security

High-Severity Flaw in Open WebUI Affects AI Connections

Team-CWDBy Team-CWDJanuary 6, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A high-severity security vulnerability affecting Open WebUI has been uncovered, potentially exposing users to account takeover (ATO) and, in some cases, full server compromise.

The flaw, tracked as CVE-2025-64496 and discovered by Cato Networks researchers, impacts Open WebUI versions 0.6.34 and older when the Direct Connections feature is enabled. The issue carries a severity rating of 7.3 out of 10.

The vulnerability sits within Direct Connections, a feature that allows users to link Open WebUI to external, OpenAI-compatible model servers. While designed to support flexibility and self-hosted AI workflows, the feature can be abused if a user is persuaded to connect to a malicious server posing as a legitimate AI endpoint.

At its core, the flaw stems from a trust failure between untrusted model servers and the user’s browser session. A hostile server can send a crafted server-sent events message that triggers the execution of JavaScript code in the browser. This allows an attacker to steal authentication tokens stored in localStorage.

Once obtained, those tokens grant full access to the victim’s Open WebUI account. Chats, uploaded documents and API keys can all be exposed.

The Open WebUI backend itself remains secure unless the compromised user holds elevated permissions.

The consequences vary depending on user privileges:

  • Theft of JSON web tokens and session hijacking

  • Full account compromise, including access to chat history and uploaded files

  • Exposure of sensitive credentials shared in conversations

  • Remote code execution (RCE) if the user has workspace.tools permissions enabled

Read more on API security: API Threats Surge to 40,000 Incidents in 1H 2025

The issue was reported to Open WebUI maintainers in October 2025 and publicly disclosed on November 7 2025, following patch validation and CVE assignment.

Open WebUI versions 0.6.35 and later block the malicious execute events, addressing the user-facing risk.

“Open WebUI’s patch is effective for v0.6.35 or newer versions, which closes the user-facing Direct Connections vulnerability,” Cato Networks wrote.

“However, organizations still need to strengthen authentication, sandbox extensibility and restrict access to specific resources.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUK Launches New Cyber Unit to Bolster Defences Against Cyber Threats
Next Article DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide
Team-CWD
  • Website

Related Posts

Cyber Security

Ilya Lichtenstein Released Early After Bitfinex Hack Conviction

January 5, 2026
Cyber Security

European Space Agency Confirms Server Breach

January 5, 2026
Cyber Security

The Evolving Cybersecurity Challenge for Critical Infrastructure

January 2, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.