Skip to content

Instantly share code, notes, and snippets.

@Cristliu
Created December 18, 2025 07:27
Show Gist options
  • Select an option

  • Save Cristliu/13c41b97285b776275bc8bfd3504e51b to your computer and use it in GitHub Desktop.

Select an option

Save Cristliu/13c41b97285b776275bc8bfd3504e51b to your computer and use it in GitHub Desktop.
CVE-2025-63391 Security Advisory - Authentication Bypass in Open-WebUI

Security Advisory: CVE-2025-63391 - Authentication Bypass in Open-WebUI Config Endpoint

CVE ID: CVE-2025-63391 Date: 2025-12-18 Vendor: Open-WebUI Product: Open-WebUI Affected Versions: <= v0.6.32 Vulnerability Type: Insecure Permissions / Authentication Bypass Severity: Medium (Information Disclosure)

Summary

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

Vulnerability Details

  • Component: /api/config API endpoint, authentication middleware
  • Vulnerability: Missing access control on configuration endpoint.

Attack Vector & Impact

Attack Type: Remote

Attack Vectors: An unauthenticated attacker can send HTTP GET requests to the /api/config endpoint without any authentication credentials. The endpoint fails to implement access control, allowing anonymous users to retrieve comprehensive system configuration information.

Exposed Data:

  • Authentication status
  • Enabled features
  • Security settings
  • Integration configurations
  • User statistics

Impact:

  • Information Disclosure: Information can be used for reconnaissance to identify security weaknesses and plan unauthorized access attempts.

References

Credits

Discovered and reported by Zhihuang Liu (herecristliu@gmail.com)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment