CVE-2025-29446: n/a
open-webui v0.5.16 is vulnerable to SSRF in routers/ollama.py in function verify_connection.
AI Analysis
Technical Summary
CVE-2025-29446 is a Server-Side Request Forgery (SSRF) vulnerability identified in the open-webui project, specifically in version 0.5.16. The vulnerability exists within the routers/ollama.py file in the function verify_connection. SSRF vulnerabilities occur when an attacker can manipulate a server to make HTTP requests to arbitrary domains or IP addresses, potentially accessing internal systems or services that are otherwise inaccessible externally. In this case, the vulnerability allows an attacker with limited privileges (as indicated by the CVSS vector requiring low privileges) to induce the server to send crafted requests. The CVSS score of 3.3 (low severity) reflects that the impact is limited to confidentiality with no direct impact on integrity or availability, and exploitation does not require user interaction. The vulnerability is classified under CWE-918, which corresponds to SSRF. There are no known exploits in the wild at this time, and no patches have been linked or published yet. The vulnerability was reserved in March 2025 and published in April 2025. The affected product is open-webui, a web user interface framework or tool, though specific vendor or product details are not provided. The attack vector is local (AV:L), meaning the attacker must have some level of access to the system or network where open-webui is deployed. The vulnerability does not require user interaction and has low complexity for exploitation, but the scope is limited to confidentiality breaches without affecting integrity or availability.
Potential Impact
For European organizations, the impact of this SSRF vulnerability depends largely on the deployment of open-webui version 0.5.16 within their infrastructure. If open-webui is used internally to manage or interface with sensitive systems, this vulnerability could allow attackers with limited access to probe internal networks, potentially accessing sensitive internal endpoints or metadata services. This could lead to unauthorized information disclosure, such as internal IP addresses, service endpoints, or configuration details, which could be leveraged for further attacks. However, since the vulnerability does not affect integrity or availability, the immediate risk of service disruption or data manipulation is low. European organizations with strict data protection regulations (e.g., GDPR) must consider the confidentiality impact seriously, as any unauthorized data access could lead to compliance issues and reputational damage. The requirement for local access reduces the risk of remote exploitation, but insider threats or compromised internal accounts could exploit this vulnerability. The absence of known exploits in the wild suggests limited current threat activity, but proactive mitigation is advisable.
Mitigation Recommendations
1. Restrict access to systems running open-webui to trusted users and networks only, minimizing the risk of local attackers exploiting the SSRF vulnerability. 2. Implement strict network segmentation and firewall rules to limit the ability of compromised systems to reach sensitive internal services that could be targeted via SSRF. 3. Monitor and log all outgoing HTTP requests from open-webui to detect unusual or unauthorized request patterns that may indicate exploitation attempts. 4. Apply input validation and sanitization in the verify_connection function or related code to ensure that user-supplied URLs or parameters cannot be manipulated to trigger SSRF. 5. Stay alert for official patches or updates from the open-webui maintainers and apply them promptly once available. 6. Conduct internal security assessments and penetration tests focusing on SSRF vectors in open-webui deployments to identify and remediate weaknesses. 7. Educate internal users and administrators about the risks of SSRF and the importance of limiting access to vulnerable systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-29446: n/a
Description
open-webui v0.5.16 is vulnerable to SSRF in routers/ollama.py in function verify_connection.
AI-Powered Analysis
Technical Analysis
CVE-2025-29446 is a Server-Side Request Forgery (SSRF) vulnerability identified in the open-webui project, specifically in version 0.5.16. The vulnerability exists within the routers/ollama.py file in the function verify_connection. SSRF vulnerabilities occur when an attacker can manipulate a server to make HTTP requests to arbitrary domains or IP addresses, potentially accessing internal systems or services that are otherwise inaccessible externally. In this case, the vulnerability allows an attacker with limited privileges (as indicated by the CVSS vector requiring low privileges) to induce the server to send crafted requests. The CVSS score of 3.3 (low severity) reflects that the impact is limited to confidentiality with no direct impact on integrity or availability, and exploitation does not require user interaction. The vulnerability is classified under CWE-918, which corresponds to SSRF. There are no known exploits in the wild at this time, and no patches have been linked or published yet. The vulnerability was reserved in March 2025 and published in April 2025. The affected product is open-webui, a web user interface framework or tool, though specific vendor or product details are not provided. The attack vector is local (AV:L), meaning the attacker must have some level of access to the system or network where open-webui is deployed. The vulnerability does not require user interaction and has low complexity for exploitation, but the scope is limited to confidentiality breaches without affecting integrity or availability.
Potential Impact
For European organizations, the impact of this SSRF vulnerability depends largely on the deployment of open-webui version 0.5.16 within their infrastructure. If open-webui is used internally to manage or interface with sensitive systems, this vulnerability could allow attackers with limited access to probe internal networks, potentially accessing sensitive internal endpoints or metadata services. This could lead to unauthorized information disclosure, such as internal IP addresses, service endpoints, or configuration details, which could be leveraged for further attacks. However, since the vulnerability does not affect integrity or availability, the immediate risk of service disruption or data manipulation is low. European organizations with strict data protection regulations (e.g., GDPR) must consider the confidentiality impact seriously, as any unauthorized data access could lead to compliance issues and reputational damage. The requirement for local access reduces the risk of remote exploitation, but insider threats or compromised internal accounts could exploit this vulnerability. The absence of known exploits in the wild suggests limited current threat activity, but proactive mitigation is advisable.
Mitigation Recommendations
1. Restrict access to systems running open-webui to trusted users and networks only, minimizing the risk of local attackers exploiting the SSRF vulnerability. 2. Implement strict network segmentation and firewall rules to limit the ability of compromised systems to reach sensitive internal services that could be targeted via SSRF. 3. Monitor and log all outgoing HTTP requests from open-webui to detect unusual or unauthorized request patterns that may indicate exploitation attempts. 4. Apply input validation and sanitization in the verify_connection function or related code to ensure that user-supplied URLs or parameters cannot be manipulated to trigger SSRF. 5. Stay alert for official patches or updates from the open-webui maintainers and apply them promptly once available. 6. Conduct internal security assessments and penetration tests focusing on SSRF vectors in open-webui deployments to identify and remediate weaknesses. 7. Educate internal users and administrators about the risks of SSRF and the importance of limiting access to vulnerable systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd707f
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/12/2025, 4:46:34 AM
Last updated: 7/27/2025, 2:09:36 AM
Views: 12
Related Threats
CVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.