Home

Description

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-supplied URLs via requests.get() with zero validation — no scheme check, no IP filtering, no hostname allowlist. An attacker can access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content is exfiltrated through the RAG pipeline. This vulnerability is fixed in 4.3.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-07 | Updated 2026-04-09 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 4.3
affected

References

github.com/...-webui/security/advisories/GHSA-jvrj-w5hq-6cp2 exploit

github.com/...-webui/security/advisories/GHSA-jvrj-w5hq-6cp2

cve.org (CVE-2026-35486)

nvd.nist.gov (CVE-2026-35486)

Download JSON