Eval Injection in Open WebUI - CVE-2025-64496

 

Eval Injection in Open WebUI - CVE-2025-64496

Published: April 24, 2026


Vulnerability identifier: #VU127469
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-64496
CWE-ID: CWE-95
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Open WebUI
Affected software:
Open WebUI

Detailed vulnerability description

The vulnerability allows a remote user to execute arbitrary JavaScript in the victim's browser.

The vulnerability exists due to improper neutralization of directives in dynamically evaluated code in the frontend SSE event handler when processing Server-Sent Events from an external model server through Direct Connections. A remote user can send a specially crafted SSE execute event to execute arbitrary JavaScript in the victim's browser.

User interaction is required, and exploitation requires Direct Connections to be enabled and the victim to add the attacker's external model URL.


How to mitigate CVE-2025-64496

Install security update from vendor's website.

Sources