We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46571

Open WebUI vulnerable to limited stored XSS vila uploaded html file



Description

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.6.6, low privileged users can upload HTML files which contain JavaScript code via the `/api/v1/files/` backend endpoint. This endpoint returns a file id, which can be used to open the file in the browser and trigger the JavaScript code in the user's browser. Under the default settings, files uploaded by low-privileged users can only be viewed by admins or themselves, limiting the impact of this vulnerability. A link to such a file can be sent to an admin, and if clicked, will give the low-privileged user complete control over the admin's account, ultimately enabling RCE via functions. Version 0.6.6 contains a fix for the issue.

Reserved 2025-04-24 | Published 2025-05-05 | Updated 2025-05-05 | Assigner GitHub_M


MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 0.6.6
affected

References

github.com/...-webui/security/advisories/GHSA-8gh5-qqh8-hq3x

github.com/...ommit/ef2aeb7c0eb976bac759e59ac359c94a5b8dc7e0

github.com/.../blob/main/backend/open_webui/routers/files.py

cve.org (CVE-2025-46571)

nvd.nist.gov (CVE-2025-46571)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46571

Support options

Helpdesk Chat, Email, Knowledgebase