Description
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_prompt() allows reading any .txt file on the server filesystem. The file content is returned verbatim in the API response. This vulnerability is fixed in 4.3.
Published: 2026-04-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Disclosure
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a path traversal flaw in the load_prompt() function of text‑generation‑webui. An attacker, without authentication, can provide a crafted request that causes the server to resolve file paths and read any .txt file on the filesystem. The file content is returned verbatim via the API, enabling disclosure of configuration files, credentials, or other sensitive documents. The flaw corresponds to CWE‑22, “Path Traversal.”

Affected Systems

The flaw affects installations of oobabooga's text‑generation‑webui that are running any version earlier than 4.3. Users of the open‑source web interface should verify whether their deployment uses an older release and apply the update if possible.

Risk and Exploitability

The CVSS v3.1 base score is 5.3, indicating moderate severity. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. The attack can be performed remotely using the public API, and no credentials are required. Because any .txt file can be read, the potential damage ranges from partial information disclosure to full compromise of secrets stored in plain text. The flaw has been patched in release 4.3, so applying the update eliminates the risk.

Generated by OpenCVE AI on April 7, 2026 at 21:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to text‑generation‑webui version 4.3 or later.
  • Verify that the update has been applied by checking the version number in the application.
  • If an update is not immediately possible, disable or restrict access to the load_prompt endpoint so that only trusted users can invoke it.
  • Ensure the web server runs with least‑privilege permissions, preventing the web process from reading sensitive files outside the intended directory.
  • Monitor server logs for unauthorized file‑read attempts and investigate any anomalous activity promptly.

Generated by OpenCVE AI on April 7, 2026 at 21:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Oobabooga
Oobabooga text-generation-webui
Vendors & Products Oobabooga
Oobabooga text-generation-webui

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_prompt() allows reading any .txt file on the server filesystem. The file content is returned verbatim in the API response. This vulnerability is fixed in 4.3.
Title text-generation-webui has a Path Traversal in load_prompt() — .txt file read without authentication
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Oobabooga Text-generation-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T18:14:46.381Z

Reserved: 2026-04-02T20:49:44.454Z

Link: CVE-2026-35487

cve-icon Vulnrichment

Updated: 2026-04-07T18:14:41.731Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T16:16:26.853

Modified: 2026-04-08T21:27:00.663

Link: CVE-2026-35487

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:48:38Z

Weaknesses