CVE-2025-29446: n/a
open-webui v0.5.16 is vulnerable to SSRF in routers/ollama.py in function verify_connection.
AI Analysis
Technical Summary
CVE-2025-29446 identifies a Server-Side Request Forgery (SSRF) vulnerability in the open-webui project, specifically in version 0.5.16 within the routers/ollama.py file, in the function verify_connection. SSRF vulnerabilities occur when an attacker can manipulate a server to make HTTP requests to unintended locations, potentially accessing internal systems or sensitive information that would otherwise be inaccessible. In this case, the vulnerability allows an attacker with limited privileges (PR:L) and no user interaction (UI:N) to induce the server to send requests to arbitrary internal or external resources. The CVSS v3.1 score is 3.3, indicating a low severity, primarily because the attack vector is local (AV:L), requiring some level of access to the system, and the impact is limited to confidentiality (C:L) with no impact on integrity or availability. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other components. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-918, which corresponds to SSRF issues. The function verify_connection likely attempts to validate or test connectivity, but due to insufficient input validation or sanitization, it can be abused to perform SSRF attacks. This vulnerability could be leveraged to access internal services, metadata endpoints, or other restricted resources within the network environment where open-webui is deployed. However, exploitation requires local access or some level of privilege, limiting the attack surface.
Potential Impact
For European organizations using open-webui v0.5.16, this SSRF vulnerability poses a limited but non-negligible risk. The primary impact is potential unauthorized disclosure of internal network information or sensitive data accessible via internal endpoints. Since the vulnerability requires local access or limited privileges, it is less likely to be exploited remotely by external attackers without initial compromise. However, in environments where open-webui is deployed on critical infrastructure or within sensitive internal networks, an attacker who gains limited access could pivot to internal services, potentially escalating their attack. The confidentiality impact could lead to exposure of internal APIs, configuration data, or cloud metadata services, which could facilitate further attacks. The lack of impact on integrity and availability reduces the risk of direct service disruption or data tampering. Given the low CVSS score and absence of known exploits, the immediate threat level is low, but organizations should not disregard the vulnerability, especially in high-security environments or where open-webui interfaces with sensitive systems.
Mitigation Recommendations
1. Restrict access to the open-webui service to trusted users and networks only, minimizing the risk of local or limited privilege attackers exploiting the SSRF. 2. Implement network segmentation and firewall rules to prevent the open-webui host from making unauthorized requests to internal services or sensitive endpoints, such as cloud metadata servers or internal APIs. 3. Monitor and log outgoing requests from open-webui to detect unusual or unauthorized connection attempts indicative of SSRF exploitation. 4. Apply strict input validation and sanitization in the verify_connection function to ensure only legitimate and expected URLs or endpoints are accepted. 5. If possible, update to a patched version of open-webui once available or apply custom patches to fix the SSRF vulnerability in routers/ollama.py. 6. Conduct internal security assessments and penetration testing focusing on SSRF vectors within open-webui deployments. 7. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with SSRF detection capabilities to block suspicious requests.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-29446: n/a
Description
open-webui v0.5.16 is vulnerable to SSRF in routers/ollama.py in function verify_connection.
AI-Powered Analysis
Technical Analysis
CVE-2025-29446 identifies a Server-Side Request Forgery (SSRF) vulnerability in the open-webui project, specifically in version 0.5.16 within the routers/ollama.py file, in the function verify_connection. SSRF vulnerabilities occur when an attacker can manipulate a server to make HTTP requests to unintended locations, potentially accessing internal systems or sensitive information that would otherwise be inaccessible. In this case, the vulnerability allows an attacker with limited privileges (PR:L) and no user interaction (UI:N) to induce the server to send requests to arbitrary internal or external resources. The CVSS v3.1 score is 3.3, indicating a low severity, primarily because the attack vector is local (AV:L), requiring some level of access to the system, and the impact is limited to confidentiality (C:L) with no impact on integrity or availability. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other components. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-918, which corresponds to SSRF issues. The function verify_connection likely attempts to validate or test connectivity, but due to insufficient input validation or sanitization, it can be abused to perform SSRF attacks. This vulnerability could be leveraged to access internal services, metadata endpoints, or other restricted resources within the network environment where open-webui is deployed. However, exploitation requires local access or some level of privilege, limiting the attack surface.
Potential Impact
For European organizations using open-webui v0.5.16, this SSRF vulnerability poses a limited but non-negligible risk. The primary impact is potential unauthorized disclosure of internal network information or sensitive data accessible via internal endpoints. Since the vulnerability requires local access or limited privileges, it is less likely to be exploited remotely by external attackers without initial compromise. However, in environments where open-webui is deployed on critical infrastructure or within sensitive internal networks, an attacker who gains limited access could pivot to internal services, potentially escalating their attack. The confidentiality impact could lead to exposure of internal APIs, configuration data, or cloud metadata services, which could facilitate further attacks. The lack of impact on integrity and availability reduces the risk of direct service disruption or data tampering. Given the low CVSS score and absence of known exploits, the immediate threat level is low, but organizations should not disregard the vulnerability, especially in high-security environments or where open-webui interfaces with sensitive systems.
Mitigation Recommendations
1. Restrict access to the open-webui service to trusted users and networks only, minimizing the risk of local or limited privilege attackers exploiting the SSRF. 2. Implement network segmentation and firewall rules to prevent the open-webui host from making unauthorized requests to internal services or sensitive endpoints, such as cloud metadata servers or internal APIs. 3. Monitor and log outgoing requests from open-webui to detect unusual or unauthorized connection attempts indicative of SSRF exploitation. 4. Apply strict input validation and sanitization in the verify_connection function to ensure only legitimate and expected URLs or endpoints are accepted. 5. If possible, update to a patched version of open-webui once available or apply custom patches to fix the SSRF vulnerability in routers/ollama.py. 6. Conduct internal security assessments and penetration testing focusing on SSRF vectors within open-webui deployments. 7. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with SSRF detection capabilities to block suspicious requests.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd707f
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 6/11/2025, 5:02:26 AM
Last updated: 7/5/2025, 6:02:03 AM
Views: 6
Related Threats
CVE-2025-7076: Improper Access Controls in BlackVue Dashcam 590X
MediumCVE-2025-7075: Unrestricted Upload in BlackVue Dashcam 590X
MediumCVE-2025-6022
LowCVE-2025-5316
LowCVE-2025-5104
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.