CVE-2025-63681: open-webui: Access Control bypass enables privilege escalation
GHSA-frv8-gffc-37px LOW PoC AVAILABLE CISA: TRACK*CVE-2025-63681 is a broken object-level authorization flaw in Open-WebUI v0.6.33 that lets any authenticated user cancel any other user's running LLM inference task—no privilege escalation required. While CVSS is low and there is no data exposure, in multi-user or enterprise deployments a single compromised or malicious account can silently kill production inference workflows on demand. Upgrade when a patch ships; interim mitigation is restricting /api/tasks/stop/ to admin roles at the reverse proxy layer.
Risk Assessment
Low overall risk, but contextually elevated in multi-tenant Open-WebUI deployments where business-critical LLM workflows run. Exploitation requires only a valid authenticated session—no special AI/ML knowledge needed. No data exfiltration, no RCE, no admin escalation. Risk amplifies in environments where long-running agentic or batch LLM jobs are business-critical (contract analysis, report generation, automated triage). EPSS 0.00013 confirms negligible exploit-in-the-wild activity at time of disclosure. Primary threat vector is insider threat or post-credential-compromise lateral movement.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| open-webui | pip | <= 0.6.33 | No patch |
Do you use open-webui? You're affected.
Severity & Risk
Recommended Action
5 steps-
Patch: No official fix released at CVE publication—monitor open-webui GitHub releases and apply promptly when available.
-
Workaround: Add reverse proxy rule (nginx/Caddy) to block or restrict POST /api/tasks/stop/ to admin session tokens only.
-
Detection: Correlate /api/tasks/stop/ API calls with task ownership logs—alert when the calling user_id does not match the task creator user_id.
-
Network control: If Open-WebUI is internal tooling, ensure /api/ endpoints are not externally reachable.
-
Access hygiene: Audit and prune Open-WebUI accounts—remove dormant or shared credentials that could be abused.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-63681?
CVE-2025-63681 is a broken object-level authorization flaw in Open-WebUI v0.6.33 that lets any authenticated user cancel any other user's running LLM inference task—no privilege escalation required. While CVSS is low and there is no data exposure, in multi-user or enterprise deployments a single compromised or malicious account can silently kill production inference workflows on demand. Upgrade when a patch ships; interim mitigation is restricting /api/tasks/stop/ to admin roles at the reverse proxy layer.
Is CVE-2025-63681 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2025-63681, increasing the risk of exploitation.
How to fix CVE-2025-63681?
1. Patch: No official fix released at CVE publication—monitor open-webui GitHub releases and apply promptly when available. 2. Workaround: Add reverse proxy rule (nginx/Caddy) to block or restrict POST /api/tasks/stop/ to admin session tokens only. 3. Detection: Correlate /api/tasks/stop/ API calls with task ownership logs—alert when the calling user_id does not match the task creator user_id. 4. Network control: If Open-WebUI is internal tooling, ensure /api/ endpoints are not externally reachable. 5. Access hygiene: Audit and prune Open-WebUI accounts—remove dormant or shared credentials that could be abused.
What systems are affected by CVE-2025-63681?
This vulnerability affects the following AI/ML architecture patterns: LLM frontend/UI platforms, multi-user inference serving, self-hosted AI assistants, agentic workflow orchestration.
What is the CVSS score for CVE-2025-63681?
No CVSS score has been assigned yet.
Technical Details
NVD Description
open-webui v0.6.33 is vulnerable to Incorrect Access Control. The API /api/tasks/stop/ directly accesses and cancels tasks without verifying user ownership, enabling attackers (a normal user) to stop arbitrary LLM response tasks.
Exploitation Scenario
A disgruntled employee with a standard Open-WebUI account targets a colleague running a time-sensitive 45-minute LLM document analysis job. After observing the task initiation in the shared UI, the attacker calls POST /api/tasks/stop/{task_id} using their own valid session cookie—no elevated privileges, no special tooling, just curl. The task terminates silently with no attribution in the UI. The attacker repeats this pattern against any user's active jobs, creating sustained service degradation that appears as system instability rather than targeted interference. No native audit trail ties the stop event to the attacker's identity.
Weaknesses (CWE)
References
Timeline
Related Vulnerabilities
CVE-2026-44551 9.1 open-webui: LDAP auth bypass — full account takeover
Same package: open-webui CVE-2025-64495 8.7 Open WebUI: XSS-to-RCE via malicious prompt injection
Same package: open-webui CVE-2026-44552 8.7 open-webui: Redis cache poisoning enables cross-instance tool hijack
Same package: open-webui CVE-2025-65958 8.5 open-webui: SSRF allows internal network access
Same package: open-webui CVE-2024-7990 8.4 open-webui: Stored XSS enables admin session hijack
Same package: open-webui
AI Threat Alert