Impact
An attacker who can use the web interface to save extension settings may write arbitrary Python files to the application root directory. By overwriting a core file such as download‑model.py, the attacker can later trigger that file from the Model menu, causing the server to execute the injected code. This gives the attacker full control over the server and allows exfiltration of data, persistence, or any other malicious action. The weakness is a path traversal error that permits file write outside the intended settings directory.
Affected Systems
The vulnerability affects the text-generation-webui application by oobabooga. All versions prior to 4.1.1 are susceptible; versions 4.1.1 and later contain the fix.
Risk and Exploitability
The flaw has a CVSS score of 9.1, indicating severe impact. No EPSS score is available, and the issue is not listed in CISA’s KEV catalog. The likely attack vector is through the web UI, where a user with write access to the extension settings can issue a request that saves malicious file paths. If the web interface is publicly reachable, an unauthenticated attacker could also exploit the flaw by crafting a request to the relevant endpoint. The combination of high severity and potential remote access makes this a top priority for remediation.
OpenCVE Enrichment