Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63391: n/a

0
High
VulnerabilityCVE-2025-63391cvecve-2025-63391
Published: Thu Dec 18 2025 (12/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

AI-Powered Analysis

AILast updated: 12/18/2025, 16:00:00 UTC

Technical Analysis

CVE-2025-63391 identifies a critical authentication bypass vulnerability in Open-WebUI versions up to 0.6.32. The vulnerability resides in the /api/config endpoint, which is designed to provide system configuration data. Due to missing authentication and authorization checks, this endpoint can be accessed remotely by unauthenticated attackers. This flaw allows attackers to retrieve sensitive configuration details that could include system settings, credentials, or other operational parameters. Such exposure can facilitate further attacks, including privilege escalation, lateral movement, or targeted exploitation of the affected system. The vulnerability does not require user interaction or prior authentication, making it straightforward to exploit if the endpoint is exposed to untrusted networks. Although no public exploits have been reported yet, the risk remains significant given the nature of the data exposed. Open-WebUI is commonly used in web-based management interfaces, and its compromise can undermine the security posture of the managed systems. The absence of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, the impact of CVE-2025-63391 can be substantial. Exposure of sensitive configuration data can lead to unauthorized disclosure of operational parameters, potentially including credentials or network configurations. This compromises confidentiality and may enable attackers to manipulate system settings, impacting integrity. The vulnerability could also lead to broader network compromise if attackers leverage the exposed data to pivot within the environment. Organizations relying on Open-WebUI for critical infrastructure management or internal system administration face increased risk of operational disruption and data breaches. The ease of exploitation without authentication increases the threat level, especially for systems accessible from external or semi-trusted networks. The lack of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization exists. Failure to address this vulnerability could result in regulatory and compliance issues under European data protection laws if sensitive data is leaked.

Mitigation Recommendations

To mitigate CVE-2025-63391, organizations should first identify all instances of Open-WebUI in their environment and verify the version in use. Immediate steps include restricting network access to the /api/config endpoint using firewall rules, VPNs, or network segmentation to limit exposure to trusted users only. Implementing web application firewalls (WAFs) with custom rules to detect and block unauthorized access attempts can provide additional protection. If possible, upgrade Open-WebUI to a patched version once available or apply vendor-provided workarounds. Monitoring and logging access to the API endpoints should be enhanced to detect anomalous or unauthorized requests promptly. Additionally, reviewing and hardening system configurations and credentials exposed via the interface can reduce the risk of further exploitation. Organizations should also conduct security awareness and incident response planning to prepare for potential exploitation scenarios. Regular vulnerability scanning and penetration testing focused on management interfaces will help identify similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69441d2a4eb3efac369420a5

Added to database: 12/18/2025, 3:26:34 PM

Last enriched: 12/18/2025, 4:00:00 PM

Last updated: 12/19/2025, 4:07:59 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats