Impact
The vulnerability resides in the superbooga and superboogav2 RAG extensions of the text-generation-webui application, where user-supplied URLs are fetched using requests.get without any validation of scheme, IP addresses, or hostname allowlist. This lack of validation permits serverside request forgery, enabling an attacker to request internal or cloud metadata endpoints, exfiltrate the retrieved content, and potentially capture IAM credentials. The flaw constitutes a high‑impact data exfiltration vector and is classified as CWE‑918.
Affected Systems
Affected systems include all installations of the open‑source text‑generation‑webui application using any version before 4.3, particularly when the superbooga or superboogav2 extensions are enabled. The primary vendor is oobabooga. No explicit version range is given beyond "prior to 4.3"; therefore any version below this release is considered vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, while an EPSS score of less than 1 percent suggests low observed exploitation probability to date. The vulnerability is not currently listed in the CISA KEV catalog. The likely attack vector is an unauthenticated or lightly authenticated web UI request that supplies a malicious URL to the RAG extension. Because the application makes outbound HTTP calls without validation, an attacker controlling the URL can trigger the SSRF, provided the web interface is publicly reachable and does not enforce strict access controls.
OpenCVE Enrichment