Impact
The vulnerability allows an attacker to perform a path traversal in the load_preset() function of text-generation-webui, enabling the reading of any .yaml file on the server without authentication. The API returns parsed key-value pairs from the YAML file, potentially exposing passwords, API keys, and connection strings. This results in disclosure of confidential data but does not grant remote code execution.
Affected Systems
The issue affects the oobabooga:text-generation-webui application, specifically all installed versions earlier than 4.3. Users running any pre‑4.3 release are vulnerable.
Risk and Exploitability
With a CVSS score of 5.3, the impact is moderate. The flaw is exploitable via the publicly accessible load_preset API endpoint, meaning attackers who can reach the application can read arbitrary files. No exploitation probability is published and the vulnerability is not listed in CISA’s KEV. Given the lack of authentication, the attack likelihood is high for any exposed instance, and the resulting confidentiality breach could compromise sensitive credentials.
OpenCVE Enrichment