DOM XSS Vulnerability in Open WebUI Self-Hosted AI Platform
CVE-2025-64495
Key Information:
- Vendor
Open-webui
- Status
- Vendor
- CVE Published:
- 8 November 2025
Badges
What is CVE-2025-64495?
CVE-2025-64495 is a vulnerability identified in the Open WebUI self-hosted AI platform, which is designed to function entirely offline. This platform facilitates various AI interactions by allowing users to create and manage custom chat prompts. The vulnerability specifically pertains to versions 0.6.34 and earlier, where the feature enabling users to insert custom prompts as rich text is susceptible to a DOM-based Cross-Site Scripting (XSS) attack. When this feature is activated, the prompt body's contents are directly rendered into the document's DOM via the .innerHtml property without appropriate sanitization. This flaw can be exploited by any user who has the permissions to generate prompts, as they can insert malicious scripts that may be executed when other users interact with the affected commands. Consequently, this poses a significant risk, allowing for unauthorized access or manipulation of data.
Potential impact of CVE-2025-64495
-
Data Breach Risks: The vulnerability facilitates the potential for attackers to execute scripts that could lead to the unauthorized accessing or leaking of sensitive user data. This could have severe implications for data privacy and compliance with regulations.
-
User Trust Erosion: If users become aware of this vulnerability and its implications, their trust in the security of the Open WebUI platform may be compromised. This could result in decreased user adoption or an exodus of existing users from the platform.
-
Malicious Payload Execution: The absence of sufficient input sanitization allows attackers to plant payloads that execute upon command, leading to a complete compromise of the session or data of unsuspecting users engaging with the platform. This scenario could further exacerbate the impact by enabling the spread of other malicious activities throughout the organization.
Affected Version(s)
open-webui < 0.6.35
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
CVE-2025-64495 Impact, Exploitability, and Mitigation Steps | Wiz
Understand the critical aspects of CVE-2025-64495 with a detailed vulnerability assessment, exploitation potential, affected technologies, and remediation guidance.
References
CVSS V3.1
Timeline
- π°
First article discovered by wiz.io
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
