text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_prompt() allows reading any .txt file on the server filesystem. The file content is returned verbatim in the API response. This vulnerability is fixed in 4.3.
References
| Link | Resource |
|---|---|
| https://github.com/oobabooga/text-generation-webui/security/advisories/GHSA-mfgg-vvc6-vqq7 | Vendor Advisory |
Configurations
History
09 Apr 2026, 18:46
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:oobabooga:text_generation_web_ui:*:*:*:*:*:*:*:* | |
| First Time |
Oobabooga text Generation Web Ui
Oobabooga |
|
| References | () https://github.com/oobabooga/text-generation-webui/security/advisories/GHSA-mfgg-vvc6-vqq7 - Vendor Advisory |
07 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 16:16
Updated : 2026-04-09 18:46
NVD link : CVE-2026-35487
Mitre link : CVE-2026-35487
CVE.ORG link : CVE-2026-35487
JSON object : View
Products Affected
oobabooga
- text_generation_web_ui
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
