CVE-2026-35486 PUBLISHED

text-generation-webui has a SSRF in superbooga/superboogav2 extensions — no URL validation

Assigner: GitHub_M
Reserved: 02.04.2026 Published: 07.04.2026 Updated: 07.04.2026

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-supplied URLs via requests.get() with zero validation — no scheme check, no IP filtering, no hostname allowlist. An attacker can access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content is exfiltrated through the RAG pipeline. This vulnerability is fixed in 4.3.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 7.5

Product Status

Vendor oobabooga
Product text-generation-webui
Versions
  • Version < 4.3 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE