CVE-2025-63391

7.5 HIGH

📋 TL;DR

An authentication bypass vulnerability in Open-WebUI's /api/config endpoint allows unauthenticated remote attackers to access sensitive system configuration data. This affects all Open-WebUI deployments running version 0.6.32 or earlier. Attackers can retrieve configuration details that could facilitate further attacks.

💻 Affected Systems

Products:
  • Open-WebUI
Versions: <= 0.6.32
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the /api/config endpoint accessible are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain full system configuration including API keys, database credentials, and deployment details, enabling complete system compromise, data exfiltration, or lateral movement.

🟠

Likely Case

Attackers harvest sensitive configuration data like API keys and internal endpoints, which can be used for credential theft, reconnaissance, or targeted follow-up attacks.

🟢

If Mitigated

With proper authentication controls, only authorized administrators can access configuration data, limiting exposure to legitimate users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to /api/config endpoint without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 0.6.32

Vendor Advisory: https://github.com/open-webui/open-webui/issues

Restart Required: Yes

Instructions:

1. Update Open-WebUI to version >0.6.32. 2. Restart the Open-WebUI service. 3. Verify the /api/config endpoint now requires authentication.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to the /api/config endpoint using firewall rules or web server configuration.

iptables -A INPUT -p tcp --dport <webui-port> -m string --string '/api/config' --algo bm -j DROP

Reverse Proxy Authentication

all

Place Open-WebUI behind a reverse proxy that enforces authentication for the /api/config endpoint.

🧯 If You Can't Patch

  • Deploy network segmentation to isolate Open-WebUI from untrusted networks.
  • Implement web application firewall (WAF) rules to block unauthenticated requests to /api/config.

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://<target>:<port>/api/config without authentication. If it returns configuration data, system is vulnerable.

Check Version:

Check Open-WebUI version in web interface or configuration files.

Verify Fix Applied:

After patching, same unauthenticated request should return 401/403 error or no data.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to GET /api/config from unauthenticated IPs
  • Unusual access patterns to configuration endpoint

Network Indicators:

  • Unauthenticated HTTP GET requests to /api/config endpoint
  • Traffic spikes to configuration endpoint

SIEM Query:

source="webui.log" AND (uri="/api/config" AND status=200 AND NOT user_authenticated=true)

🔗 References

📤 Share & Export