CVE-2026-35487

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_prompt() allows reading any .txt file on the server filesystem. The file content is returned verbatim in the API response. This vulnerability is fixed in 4.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oobabooga:text_generation_web_ui:*:*:*:*:*:*:*:*

History

09 Apr 2026, 18:46

Type Values Removed Values Added
CPE cpe:2.3:a:oobabooga:text_generation_web_ui:*:*:*:*:*:*:*:*
First Time Oobabooga text Generation Web Ui
Oobabooga
References () https://github.com/oobabooga/text-generation-webui/security/advisories/GHSA-mfgg-vvc6-vqq7 - () https://github.com/oobabooga/text-generation-webui/security/advisories/GHSA-mfgg-vvc6-vqq7 - Vendor Advisory

07 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-07 16:16

Updated : 2026-04-09 18:46


NVD link : CVE-2026-35487

Mitre link : CVE-2026-35487

CVE.ORG link : CVE-2026-35487


JSON object : View

Products Affected

oobabooga

  • text_generation_web_ui
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')