Vulnerability Description
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. In versions 0.6.34 and below, the functionality that inserts custom prompts into the chat window is vulnerable to DOM XSS when 'Insert Prompt as Rich Text' is enabled, since the prompt body is assigned to the DOM sink .innerHtml without sanitisation. Any user with permissions to create prompts can abuse this to plant a payload that could be triggered by other users if they run the corresponding / command to insert the prompt. This issue is fixed in version 0.6.35.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openwebui | Open Webui | < 0.6.35 |
Related Weaknesses (CWE)
References
- https://github.com/open-webui/open-webui/blob/7a83e7dfa367d19f762ec17cac5e4a94eaProduct
- https://github.com/open-webui/open-webui/commit/eb9c4c0e358c274aea35f21c2856c0a2Patch
- https://github.com/open-webui/open-webui/security/advisories/GHSA-w7xj-8fx7-wfchExploitThird Party Advisory
FAQ
What is CVE-2025-64495?
CVE-2025-64495 is a vulnerability with a CVSS score of 8.7 (HIGH). Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. In versions 0.6.34 and below, the functionality that inserts custom prompts into the chat window is v...
How severe is CVE-2025-64495?
CVE-2025-64495 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-64495?
Check the references section above for vendor advisories and patch information. Affected products include: Openwebui Open Webui.