Impact
An unauthenticated path traversal flaw in the load_template() function of text‑generation‑webui permits an attacker to read arbitrary files on the server with .jinja, .jinja2, .yaml, or .yml extensions. When a .jinja file is requested, its entire content is returned verbatim, exposing source code or sensitive data. For .yaml files the server parses the file and returns a single extracted key, which can still reveal configuration or secrets. This vulnerability enables confidentiality compromise without affecting integrity or availability.
Affected Systems
The flaw affects the open‑source web interface for Large Language Models developed by oobabooga, specifically all releases prior to version 4.3. Users running any earlier iteration of text‑generation‑webui are exposed.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is presumptively an unauthenticated HTTP request to the load_template endpoint with a crafted file path; no authentication or privileged access is required. Given that the exploit is straightforward and the potential to read arbitrary server files exists, the risk is significant for installations that store sensitive configuration or code on the same filesystem.
OpenCVE Enrichment