Description
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-supplied URLs via requests.get() with zero validation — no scheme check, no IP filtering, no hostname allowlist. An attacker can access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content is exfiltrated through the RAG pipeline. This vulnerability is fixed in 4.3.
Published: 2026-04-07
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Credential theft and internal network compromise via SSRF
Action: Patch Now
AI Analysis

Impact

The vulnerability resides in the superbooga and superboogav2 RAG extensions of the text-generation-webui application, where user-supplied URLs are fetched using requests.get without any validation of scheme, IP addresses, or hostname allowlist. This lack of validation permits serverside request forgery, enabling an attacker to request internal or cloud metadata endpoints, exfiltrate the retrieved content, and potentially capture IAM credentials. The flaw constitutes a high‑impact data exfiltration vector and is classified as CWE‑918.

Affected Systems

Affected systems include all installations of the open‑source text‑generation‑webui application using any version before 4.3, particularly when the superbooga or superboogav2 extensions are enabled. The primary vendor is oobabooga. No explicit version range is given beyond "prior to 4.3"; therefore any version below this release is considered vulnerable.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, while an EPSS score of less than 1 percent suggests low observed exploitation probability to date. The vulnerability is not currently listed in the CISA KEV catalog. The likely attack vector is an unauthenticated or lightly authenticated web UI request that supplies a malicious URL to the RAG extension. Because the application makes outbound HTTP calls without validation, an attacker controlling the URL can trigger the SSRF, provided the web interface is publicly reachable and does not enforce strict access controls.

Generated by OpenCVE AI on April 9, 2026 at 21:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade text‑generation‑webui to version 4.3 or later where the issue is fixed.
  • If upgrading immediately is not feasible, restrict outbound traffic from the application to prevent connections to internal IP ranges and the metadata service address 169.254.169.254, either by firewall rules or network segmentation.
  • Disable or remove the superbooga and superboogav2 extensions until the patch is applied.
  • As a temporary measure, implement custom URL validation in the application or within the requests library to enforce whitelist rules and reject non‑HTTPS schemes.

Generated by OpenCVE AI on April 9, 2026 at 21:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Oobabooga text Generation Web Ui
CPEs cpe:2.3:a:oobabooga:text_generation_web_ui:*:*:*:*:*:*:*:*
Vendors & Products Oobabooga text Generation Web Ui

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Oobabooga
Oobabooga text-generation-webui
Vendors & Products Oobabooga
Oobabooga text-generation-webui

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-supplied URLs via requests.get() with zero validation — no scheme check, no IP filtering, no hostname allowlist. An attacker can access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content is exfiltrated through the RAG pipeline. This vulnerability is fixed in 4.3.
Title text-generation-webui has a SSRF in superbooga/superboogav2 extensions — no URL validation
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Oobabooga Text-generation-webui Text Generation Web Ui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T14:37:31.599Z

Reserved: 2026-04-02T20:49:44.454Z

Link: CVE-2026-35486

cve-icon Vulnrichment

Updated: 2026-04-09T14:37:23.287Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T16:16:26.700

Modified: 2026-04-09T18:48:51.350

Link: CVE-2026-35486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:41:32Z

Weaknesses