Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63389: n/a

0
Critical
VulnerabilityCVE-2025-63389cvecve-2025-63389
Published: Thu Dec 18 2025 (12/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

AI-Powered Analysis

AILast updated: 01/22/2026, 19:15:01 UTC

Technical Analysis

CVE-2025-63389 identifies a critical authentication bypass vulnerability in the Ollama platform, specifically affecting API endpoints in versions up to and including v0.12.3. The vulnerability arises because multiple API endpoints are exposed without requiring any form of authentication, allowing remote attackers to perform unauthorized operations related to model management. This includes potentially creating, modifying, or deleting AI models managed by the platform. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), highlighting the absence of proper access controls. The CVSS v3.1 base score of 9.8 reflects the vulnerability's ease of exploitation (no privileges or user interaction required), network attack vector, and the critical impact on confidentiality, integrity, and availability of the system. The lack of authentication means attackers can remotely manipulate AI models, potentially leading to data leakage, model poisoning, or denial of service. While no public exploits have been reported yet, the critical nature of the flaw and the increasing reliance on AI platforms make this a high-risk issue. The vulnerability was reserved in late October 2025 and published in mid-December 2025, with no patch links currently available, indicating that remediation may still be pending or in development.

Potential Impact

For European organizations, the impact of CVE-2025-63389 is significant. Organizations relying on the Ollama platform for AI model management risk unauthorized access to sensitive AI models and data, which could lead to intellectual property theft, manipulation of AI outputs, or disruption of AI-driven services. This could affect sectors such as finance, healthcare, manufacturing, and government agencies that increasingly depend on AI for decision-making and automation. The compromise of AI models could result in erroneous outputs, undermining trust and causing operational failures. Additionally, attackers could leverage the vulnerability to launch further attacks within the network or disrupt critical AI services, impacting availability. The absence of authentication also raises compliance concerns under GDPR and other data protection regulations, as unauthorized access to data could lead to breaches and regulatory penalties. The broad network exposure and lack of required privileges make this vulnerability particularly dangerous for organizations with internet-facing Ollama deployments or insufficient network segmentation.

Mitigation Recommendations

Immediate mitigation steps include restricting access to Ollama API endpoints by implementing network-level controls such as firewalls or VPNs to limit exposure to trusted users and systems only. Organizations should monitor network traffic and API logs for unusual or unauthorized access attempts. Since no official patches are currently available, applying virtual patches via Web Application Firewalls (WAFs) or API gateways to enforce authentication and access control can reduce risk. It is critical to follow Ollama’s official channels for patch releases and apply updates promptly once available. Additionally, organizations should conduct thorough audits of AI model integrity and access permissions to detect any unauthorized changes. Implementing strong identity and access management (IAM) policies around AI platforms and segregating AI infrastructure from general IT networks can further reduce attack surface. Finally, organizations should prepare incident response plans specific to AI platform compromises to quickly contain and remediate potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69441d2a4eb3efac369420a1

Added to database: 12/18/2025, 3:26:34 PM

Last enriched: 1/22/2026, 7:15:01 PM

Last updated: 2/4/2026, 5:04:42 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats