• Contact Editorial Team
  • Advertise on YNOT
  • Submit PR
Monday, April 27, 2026
  • Login
  • Register
YNOT
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
YNOT
No Result
View All Result
Home Adult Industry News from YNOT Tech News for Adult Webmasters

High-severity flaw in Open WebUI may enable remote code execution via Direct Connections

Mariana Soto by Mariana Soto
January 8, 2026
in Tech News for Adult Webmasters
504
SHARES
Share on FacebookShare on Twitter
High-severity flaw in Open WebUI may enable remote code execution via Direct Connections

A high-severity vulnerability in Open WebUI could enable account takeover and potentially lead to remote code execution in some configurations, according to research published Monday by Cato Networks. The flaw affects the popular open-source interface for self-hosted AI workflows.

Open WebUI allows external connections to other AI servers via OpenAI-compatible APIs through a feature called Direct Connections. Cato researchers discovered this feature contains a vulnerability, tracked as CVE-2025-64496, that enables potentially dangerous JavaScript code execution within the browser context.

If a user connects to a malicious server through social engineering or an impersonation attack, sending any message to the server could trigger a server-side event that runs JavaScript via a new Function() in the browser. This JavaScript could steal the user’s authentication token from localStorage and send it to the attacker, granting access to the user’s account, chat history, uploaded documents and API keys.

An attacker could achieve remote code execution on the host server if the compromised user has a specific permission called workspace.tools. With this permission, the attacker can use the stolen authentication token to create a malicious tool that executes arbitrary Python code via exec().

No sandboxing or validation is performed when executing this Python code as long as the user has the workspace.tools permission, according to Cato Networks. This allows an attacker to potentially escalate an account takeover to a full system compromise.

Cato CTRL Senior Security Researcher Vitaly Simonovich discovered the vulnerability in October 2025. It was disclosed and patched in November 2025, receiving a CVSS score of 8 from the National Institute of Standards and Technology’s National Vulnerability Database.

The flaw affects Open WebUI versions 0.6.34 and earlier. Users should update to version 0.6.35 or later, which adds middleware to block the execution of server-side events from Direct Connections servers.

Cato recommends treating connections to external AI servers like third-party code and limiting Direct Connections only to properly vetted services. Organizations should also restrict the workspace.tools permission to essential users, monitor for suspicious tool creations and implement policies to regularly rotate Open WebUI tokens.

Tags: account takeoverCato NetworksCVE-2025-64496Direct Connectionsopen sourceOpen WebUIremote code executionsecurity patchself-hosted AIWi-Fi vulnerability
Share202Tweet126
Mariana Soto

Mariana Soto

Mariana Soto reports on the business mechanics of adult entertainment — where the money flows, who’s investing, and what platforms are rising or falling. With a background in digital publishing and a sharp eye for disruption, Mariana breaks down the financial stories behind the scenes of adult media.

Related Posts

FSC Reminder: Additional TAKE IT DOWN Act Provisions Take Effect May 19
Adult Industry Legal News

FSC Reminder: Additional TAKE IT DOWN Act Provisions Take Effect May 19

April 24, 2026
STD Hero Named Official Testing Partner of Kasbh Inc.
Adult Business News

STD Hero Named Official Testing Partner of Kasbh Inc.

April 24, 2026
pjur Reflects on Partnership with Porn Film Festival Vienna
Adult Novelty News

pjur Reflects on Partnership with Porn Film Festival Vienna

April 24, 2026
Sexy Horror Parody Game “VanillaBeast: Mystery Kink” Launches on Steam
Video Game News for Adults

Sexy Horror Parody Game “VanillaBeast: Mystery Kink” Launches on Steam

April 23, 2026
Load More

SPONSOR

INDUSTRY EVENTS

Currently Playing

YNOT Summit Model Track: Nerds Dig Sexy Gamers

YNOT Summit Model Track: Nerds Dig Sexy Gamers

01:05:46

YNOT Summit Webmaster Track: Understanding Webcam Business Models

00:51:11

YNOT Summit Model Track: Cam Law 101

01:26:24

SPONSOR

POPULAR NEWS

FSC Reminder: Additional TAKE IT DOWN Act Provisions Take Effect May 19

FSC Reminder: Additional TAKE IT DOWN Act Provisions Take Effect May 19

April 24, 2026
STD Hero Named Official Testing Partner of Kasbh Inc.

STD Hero Named Official Testing Partner of Kasbh Inc.

April 24, 2026
pjur Reflects on Partnership with Porn Film Festival Vienna

pjur Reflects on Partnership with Porn Film Festival Vienna

April 24, 2026

Sponsor

YNOT YNOT

QUICK LINKS:

  • About YNOT
  • Terms of Use
  • Privacy Policy
  • Editorial Team
  • Advertise on YNOT
  • Sitemap

FRIENDS OF YNOT:

  • Best Adult Cams
  • Live Porn
  • Adult Reviews
  • Adult Email Marketing
  • Discounted Porn
  • vr porn sites
  • European Adult Biz Magazine

FRIENDS OF YNOT:

  • Rabbits Reviews
  • XXX Job Interviews
  • Adult Site Broker
  • Femdom
  • Paid Porn Sites
  • Live Sex
  • Cam girl sites
  • AI Girlfriend
  • live porn Vibra Game

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Adult Business News
  • Adult Industry Legal News
  • Adult Novelty News
  • Porn Star & Adult Talent News
  • Tech News for Adult Webmasters
  • Video Game News for Adults
  • Interviews
  • Opinions
  • YNOT Industry Wire
  • Newsletters

Copyright © 2026 YNOT Group LLC.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.