CVE-2025-46571: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in open-webui open-webui
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.6.6, low privileged users can upload HTML files which contain JavaScript code via the `/api/v1/files/` backend endpoint. This endpoint returns a file id, which can be used to open the file in the browser and trigger the JavaScript code in the user's browser. Under the default settings, files uploaded by low-privileged users can only be viewed by admins or themselves, limiting the impact of this vulnerability. A link to such a file can be sent to an admin, and if clicked, will give the low-privileged user complete control over the admin's account, ultimately enabling RCE via functions. Version 0.6.6 contains a fix for the issue.
AI Analysis
Technical Summary
CVE-2025-46571 is a medium-severity cross-site scripting (XSS) vulnerability affecting versions of the open-webui platform prior to 0.6.6. Open WebUI is a self-hosted AI platform designed to operate offline, allowing users to upload and manage files through a backend API endpoint (/api/v1/files/). The vulnerability arises because low-privileged users can upload HTML files containing malicious JavaScript code via this endpoint. When the file is accessed in a browser, the embedded JavaScript executes in the context of the viewer's session. By default, these uploaded files are only viewable by the uploader or administrators, which limits the exposure. However, an attacker with low privileges can craft a malicious HTML file and send its link to an administrator. If the admin clicks the link, the malicious script executes with the admin's privileges, enabling the attacker to hijack the admin account. This can escalate to remote code execution (RCE) through functions accessible to the compromised admin account. The vulnerability is due to improper input neutralization during web page generation (CWE-79), allowing script injection. The issue was fixed in version 0.6.6 of open-webui. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required for the initial upload, but user interaction is needed (admin clicking the link). The scope and impact are high since the attacker can escalate privileges and potentially execute arbitrary code on the server via the admin account. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using open-webui versions prior to 0.6.6, this vulnerability poses a significant risk, especially in environments where multiple users have access to upload files and administrators regularly interact with user-generated content. Successful exploitation could lead to full compromise of administrative accounts, enabling attackers to manipulate AI workflows, access sensitive data, or execute arbitrary code on the hosting infrastructure. This could disrupt AI-driven business processes, lead to data breaches, and damage organizational reputation. The offline design of open-webui does not eliminate risk since internal threat actors or compromised low-privileged accounts can exploit this vulnerability. Given the potential for privilege escalation and RCE, organizations handling sensitive AI models or data could face severe operational and compliance consequences under European data protection regulations such as GDPR.
Mitigation Recommendations
1. Immediate upgrade to open-webui version 0.6.6 or later, which contains the patch for this vulnerability. 2. Implement strict file upload validation and sanitization on the server side to reject or neutralize HTML files containing scripts. 3. Restrict file upload permissions to trusted users only, minimizing the number of low-privileged users who can upload files. 4. Educate administrators to avoid clicking on untrusted or unexpected links, especially those pointing to user-uploaded files. 5. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce XSS impact. 6. Monitor logs for unusual file uploads and access patterns to detect potential exploitation attempts. 7. Consider isolating the open-webui environment or running it with minimal privileges to limit the impact of a successful attack. 8. Regularly audit user roles and permissions to ensure least privilege principles are enforced.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium
CVE-2025-46571: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in open-webui open-webui
Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.6.6, low privileged users can upload HTML files which contain JavaScript code via the `/api/v1/files/` backend endpoint. This endpoint returns a file id, which can be used to open the file in the browser and trigger the JavaScript code in the user's browser. Under the default settings, files uploaded by low-privileged users can only be viewed by admins or themselves, limiting the impact of this vulnerability. A link to such a file can be sent to an admin, and if clicked, will give the low-privileged user complete control over the admin's account, ultimately enabling RCE via functions. Version 0.6.6 contains a fix for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-46571 is a medium-severity cross-site scripting (XSS) vulnerability affecting versions of the open-webui platform prior to 0.6.6. Open WebUI is a self-hosted AI platform designed to operate offline, allowing users to upload and manage files through a backend API endpoint (/api/v1/files/). The vulnerability arises because low-privileged users can upload HTML files containing malicious JavaScript code via this endpoint. When the file is accessed in a browser, the embedded JavaScript executes in the context of the viewer's session. By default, these uploaded files are only viewable by the uploader or administrators, which limits the exposure. However, an attacker with low privileges can craft a malicious HTML file and send its link to an administrator. If the admin clicks the link, the malicious script executes with the admin's privileges, enabling the attacker to hijack the admin account. This can escalate to remote code execution (RCE) through functions accessible to the compromised admin account. The vulnerability is due to improper input neutralization during web page generation (CWE-79), allowing script injection. The issue was fixed in version 0.6.6 of open-webui. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required for the initial upload, but user interaction is needed (admin clicking the link). The scope and impact are high since the attacker can escalate privileges and potentially execute arbitrary code on the server via the admin account. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using open-webui versions prior to 0.6.6, this vulnerability poses a significant risk, especially in environments where multiple users have access to upload files and administrators regularly interact with user-generated content. Successful exploitation could lead to full compromise of administrative accounts, enabling attackers to manipulate AI workflows, access sensitive data, or execute arbitrary code on the hosting infrastructure. This could disrupt AI-driven business processes, lead to data breaches, and damage organizational reputation. The offline design of open-webui does not eliminate risk since internal threat actors or compromised low-privileged accounts can exploit this vulnerability. Given the potential for privilege escalation and RCE, organizations handling sensitive AI models or data could face severe operational and compliance consequences under European data protection regulations such as GDPR.
Mitigation Recommendations
1. Immediate upgrade to open-webui version 0.6.6 or later, which contains the patch for this vulnerability. 2. Implement strict file upload validation and sanitization on the server side to reject or neutralize HTML files containing scripts. 3. Restrict file upload permissions to trusted users only, minimizing the number of low-privileged users who can upload files. 4. Educate administrators to avoid clicking on untrusted or unexpected links, especially those pointing to user-uploaded files. 5. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce XSS impact. 6. Monitor logs for unusual file uploads and access patterns to detect potential exploitation attempts. 7. Consider isolating the open-webui environment or running it with minimal privileges to limit the impact of a successful attack. 8. Regularly audit user roles and permissions to ensure least privilege principles are enforced.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-24T21:10:48.175Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdae76
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 8:25:12 PM
Last updated: 8/16/2025, 9:42:27 AM
Views: 14
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.