Tencent Xuanwu Lab has identified a high-severity vulnerability (CVE-2025-67303) in ComfyUI-Manager, the integrated extension component of the visual AI workflow tool ComfyUI. In out-of-the-box configurations, this flaw allows a remote attacker to compromise the system without any authentication. By bypassing security restrictions, an attacker can execute arbitrary code, leading to full server compromise.
The issue has been patched in the latest version of ComfyUI-Manager.

Vulnerability Details

ComfyUI is a node-based professional graphical interface for Stable Diffusion and serves as a cornerstone project in the open-source AI ecosystem. ComfyUI-Manager is its official extension manager, responsible for the installation and maintenance of custom nodes, models, and dependencies.

In previous versions, the data and configuration directories of ComfyUI-Manager were insufficiently protected by ComfyUI’s Web API access control mechanisms. An attacker could leverage this vulnerability to achieve Unauthenticated Remote Code Execution (RCE) on the server, leading to full system compromise.

The issue was resolved in ComfyUI-Manager v3.38 with the introduction of the System User Protection API, which ensures all configuration data is migrated to a secure, protected directory.

Credit

This vulnerability was discovered and responsibly reported by RicterZ, researcher at Tencent Xuanwu Lab.

Risk Level

High

Impact

An unauthenticated remote attacker could exploit this vulnerability to achieve full system compromise, leading to:

  • Unauthorized access to system resources.
  • Exfiltration of sensitive user data and private or proprietary AI models.

Affected Versions

ComfyUI-Manager versions < v3.38

Fixed Versions

ComfyUI-Manager versions ≥ v3.38

Mitigation and Remediation

  1. Immediate remediation is required: Update ComfyUI-Manager to v3.38+ and ensure the ComfyUI core is updated to v0.3.76+ to enable the System User Protection API.
    • You may upgrade using the built-in update mechanism in ComfyUI-Manager, or follow the official documentation for manual installation.
    • After upgrading, manual data migration is required. Please refer to the official User Data Security Migration Guide.
  2. Ensure that ComfyUI itself is updated to a version that supports the System User Protection API (e.g., v0.3.76 or later).
  3. Restrict network exposure of ComfyUI services, avoiding binding to 0.0.0.0 without proper firewalling.

Note: It is strongly recommended to back up all data before upgrading to prevent accidental data loss.

References