<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35486 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35486/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 16:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35486/feed.xml" rel="self" type="application/rss+xml"/><item><title>text-generation-webui SSRF Vulnerability (CVE-2026-35486)</title><link>https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-ssrf/</link><pubDate>Tue, 07 Apr 2026 16:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-ssrf/</guid><description>The text-generation-webui application before version 4.3 is vulnerable to server-side request forgery (SSRF) due to insufficient validation of user-supplied URLs by the superbooga and superboogav2 RAG extensions, potentially leading to credential theft and internal network reconnaissance.</description><content:encoded><![CDATA[<p>The text-generation-webui application is an open-source web interface for running Large Language Models (LLMs). Prior to version 4.3, the superbooga and superboogav2 RAG (Retrieval-Augmented Generation) extensions are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. These extensions fetch user-provided URLs using the <code>requests.get()</code> function without proper validation. Specifically, there are no checks for URL schemes (e.g., <code>file://</code>, <code>gopher://</code>), IP address filtering, or hostname whitelisting. This lack of validation allows a malicious actor to craft URLs that target internal resources, cloud metadata endpoints (e.g., AWS, Azure, GCP), and other sensitive services. Successful exploitation can lead to the exfiltration of sensitive data, including IAM credentials, and allow an attacker to probe internal network infrastructure. Version 4.3 of text-generation-webui addresses this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of text-generation-webui running a vulnerable version (prior to 4.3) with the superbooga or superboogav2 RAG extension enabled.</li>
<li>The attacker crafts a malicious URL targeting a cloud metadata endpoint (e.g., <code>http://169.254.169.254/latest/meta-data/iam/security-credentials/</code>).</li>
<li>The attacker injects the malicious URL into a text-generation-webui RAG extension user input field.</li>
<li>The application, using the <code>requests.get()</code> function, fetches the content from the attacker-controlled URL without validation.</li>
<li>The cloud metadata, containing potentially sensitive information like temporary IAM credentials, is retrieved by the application.</li>
<li>The retrieved data is processed through the RAG pipeline.</li>
<li>The attacker leverages the RAG pipeline to extract the content from the application.</li>
<li>The attacker uses the exfiltrated credentials to access and compromise other resources within the victim&rsquo;s cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35486 can have significant consequences. An attacker can potentially gain unauthorized access to cloud resources by stealing IAM credentials. This could lead to data breaches, service disruption, and financial loss. The vulnerability affects any text-generation-webui instance running a version prior to 4.3 with the vulnerable RAG extensions enabled, impacting individuals and organizations utilizing this software for LLM-based applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade text-generation-webui to version 4.3 or later to remediate the SSRF vulnerability (CVE-2026-35486).</li>
<li>Deploy the Sigma rule &ldquo;Detect text-generation-webui SSRF Attempt&rdquo; to your SIEM to detect exploitation attempts targeting cloud metadata endpoints.</li>
<li>Monitor web server logs for outbound connections to internal IP addresses (e.g., 169.254.169.254) originating from the text-generation-webui application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>text-generation-webui</category><category>cve-2026-35486</category><category>cloud</category></item></channel></rss>