Description
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-supplied URLs via requests.get() with zero validation — no scheme check, no IP filtering, no hostname allowlist. An attacker can access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content is exfiltrated through the RAG pipeline. This vulnerability is fixed in 4.3.
Published: 2026-04-07
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Server Side Request Forgery leading to possible compromise of internal resources
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows an attacker to supply arbitrary URLs to the superbooga and superboogav2 RAG extensions, which are fetched by requests.get without any validation. The lack of scheme checks, IP filtering, or hostname allowlisting can lead to Remote Server Side Request Forgery, enabling attackers to reach internal network resources, cloud metadata endpoints, or other servers behind firewalls. Successful exploitation can expose IAM credentials, and the gathered content is exfiltrated via the RAG pipeline, causing a breach of confidentiality and potentially allowing further lateral movement.

Affected Systems

The vulnerability affects the open‑source web interface text‑generation‑webui by oobabooga, specifically the superbooga and superboogav2 RAG extensions. Versions prior to 4.3 are impacted; the issue was fixed in version 4.3 and later releases.

Risk and Exploitability

The CVSS base score of 7.5 indicates a high severity. Although EPSS data is unavailable, the exploitation scenario requires only that an attacker be able to measure the web interface and provide a crafted URL; no additional privileges are needed. The vulnerability is not listed in CISA’s KEV catalog, but the potential to reach cloud metadata services and internal hosts makes it a serious threat. Attackers can leverage the SSRF to exfiltrate data or gain privileged system access, posing significant confidentiality, integrity, and availability risks.

Generated by OpenCVE AI on April 7, 2026 at 22:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade text-generation-webui to version 4.3 or newer.
  • If upgrade is delayed, disable the superbooga and superboogav2 extensions or restrict the RAG feature to trusted URLs only.
  • Review cloud infrastructure for exposed metadata endpoints and revoke or rotate any compromised IAM credentials discovered as a result of this vulnerability.

Generated by OpenCVE AI on April 7, 2026 at 22:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Oobabooga
Oobabooga text-generation-webui
Vendors & Products Oobabooga
Oobabooga text-generation-webui

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-supplied URLs via requests.get() with zero validation — no scheme check, no IP filtering, no hostname allowlist. An attacker can access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content is exfiltrated through the RAG pipeline. This vulnerability is fixed in 4.3.
Title text-generation-webui has a SSRF in superbooga/superboogav2 extensions — no URL validation
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Oobabooga Text-generation-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T14:49:37.805Z

Reserved: 2026-04-02T20:49:44.454Z

Link: CVE-2026-35486

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T16:16:26.700

Modified: 2026-04-08T21:27:00.663

Link: CVE-2026-35486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:48:39Z

Weaknesses