Description
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction. Gradio does not server-side validate dropdown values, so an attacker can POST directory traversal payloads (e.g., ../../../etc/passwd) via the API and receive the full file contents in the response. This vulnerability is fixed in 4.3.
Published: 2026-04-07
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

text-generation-webui, an open-source web interface for large language models, contains an unauthenticated path traversal flaw in the load_grammar() function. An attacker can craft directory traversal payloads, such as ../../../etc/passwd, and send them via a POST request to the API. Because Gradio does not validate dropdown values on the server side, the payload is accepted and the server returns the requested file’s content. This results in arbitrary file reading, exposing sensitive information on the host system. The vulnerability aligns with CWE‑22: Path Traversal.

Affected Systems

Affected versions are all releases of text‑generation‑webui older than 4.3, including versions 4.0 to 4.2. The product is maintained by the oobabooga project and is widely used in research and production environments. Any deployment of these versions is at risk if the API is exposed to unauthenticated users.

Risk and Exploitability

The flaw carries a CVSS base score of 7.5, indicating a high severity for confidentiality. No EPSS value is reported, and the vulnerability has not been catalogued by CISA KEV, suggesting it is not yet widely exploited but remains at significant risk. An attacker only needs network access to the host and the ability to send HTTPS requests to the API; authentication is not required. The absence of server-side validation makes exploitation trivial, so systems exposed to the public internet or without strict access controls face a heightened threat.

Generated by OpenCVE AI on April 7, 2026 at 20:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade text‑generation‑webui to version 4.3 or later.

Generated by OpenCVE AI on April 7, 2026 at 20:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Oobabooga textgen
CPEs cpe:2.3:a:oobabooga:textgen:*:*:*:*:*:*:*:*
Vendors & Products Oobabooga textgen

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Oobabooga
Oobabooga text-generation-webui
Vendors & Products Oobabooga
Oobabooga text-generation-webui

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction. Gradio does not server-side validate dropdown values, so an attacker can POST directory traversal payloads (e.g., ../../../etc/passwd) via the API and receive the full file contents in the response. This vulnerability is fixed in 4.3.
Title text-generation-webui has a Path Traversal in load_grammar() — arbitrary file read without authentication
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Oobabooga Text-generation-webui Textgen
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T15:58:51.812Z

Reserved: 2026-04-02T20:49:44.454Z

Link: CVE-2026-35485

cve-icon Vulnrichment

Updated: 2026-04-07T15:11:45.710Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T15:17:45.677

Modified: 2026-04-28T20:41:33.130

Link: CVE-2026-35485

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:48:40Z

Weaknesses