<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Text-Generation-Webui — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/text-generation-webui/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 16:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/text-generation-webui/feed.xml" rel="self" type="application/rss+xml"/><item><title>text-generation-webui SSRF Vulnerability (CVE-2026-35486)</title><link>https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-ssrf/</link><pubDate>Tue, 07 Apr 2026 16:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-ssrf/</guid><description>The text-generation-webui application before version 4.3 is vulnerable to server-side request forgery (SSRF) due to insufficient validation of user-supplied URLs by the superbooga and superboogav2 RAG extensions, potentially leading to credential theft and internal network reconnaissance.</description><content:encoded><![CDATA[<p>The text-generation-webui application is an open-source web interface for running Large Language Models (LLMs). Prior to version 4.3, the superbooga and superboogav2 RAG (Retrieval-Augmented Generation) extensions are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. These extensions fetch user-provided URLs using the <code>requests.get()</code> function without proper validation. Specifically, there are no checks for URL schemes (e.g., <code>file://</code>, <code>gopher://</code>), IP address filtering, or hostname whitelisting. This lack of validation allows a malicious actor to craft URLs that target internal resources, cloud metadata endpoints (e.g., AWS, Azure, GCP), and other sensitive services. Successful exploitation can lead to the exfiltration of sensitive data, including IAM credentials, and allow an attacker to probe internal network infrastructure. Version 4.3 of text-generation-webui addresses this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of text-generation-webui running a vulnerable version (prior to 4.3) with the superbooga or superboogav2 RAG extension enabled.</li>
<li>The attacker crafts a malicious URL targeting a cloud metadata endpoint (e.g., <code>http://169.254.169.254/latest/meta-data/iam/security-credentials/</code>).</li>
<li>The attacker injects the malicious URL into a text-generation-webui RAG extension user input field.</li>
<li>The application, using the <code>requests.get()</code> function, fetches the content from the attacker-controlled URL without validation.</li>
<li>The cloud metadata, containing potentially sensitive information like temporary IAM credentials, is retrieved by the application.</li>
<li>The retrieved data is processed through the RAG pipeline.</li>
<li>The attacker leverages the RAG pipeline to extract the content from the application.</li>
<li>The attacker uses the exfiltrated credentials to access and compromise other resources within the victim&rsquo;s cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35486 can have significant consequences. An attacker can potentially gain unauthorized access to cloud resources by stealing IAM credentials. This could lead to data breaches, service disruption, and financial loss. The vulnerability affects any text-generation-webui instance running a version prior to 4.3 with the vulnerable RAG extensions enabled, impacting individuals and organizations utilizing this software for LLM-based applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade text-generation-webui to version 4.3 or later to remediate the SSRF vulnerability (CVE-2026-35486).</li>
<li>Deploy the Sigma rule &ldquo;Detect text-generation-webui SSRF Attempt&rdquo; to your SIEM to detect exploitation attempts targeting cloud metadata endpoints.</li>
<li>Monitor web server logs for outbound connections to internal IP addresses (e.g., 169.254.169.254) originating from the text-generation-webui application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>text-generation-webui</category><category>cve-2026-35486</category><category>cloud</category></item><item><title>text-generation-webui Path Traversal Vulnerability (CVE-2026-35050)</title><link>https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-path-traversal/</link><pubDate>Mon, 06 Apr 2026 18:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-path-traversal/</guid><description>text-generation-webui versions prior to 4.1.1 are vulnerable to path traversal, allowing a high-privileged user to overwrite Python files and achieve arbitrary code execution by triggering the 'download-model.py' file through the application's 'Model' menu.</description><content:encoded><![CDATA[<p>The text-generation-webui application, an open-source web interface for running Large Language Models, contains a path traversal vulnerability (CVE-2026-35050) in versions prior to 4.1.1. A high-privileged user can exploit this vulnerability by saving extension settings in &ldquo;.py&rdquo; format within the application&rsquo;s root directory. This allows them to overwrite existing Python files, most notably &ldquo;download-model.py&rdquo;. Subsequently, the overwritten &ldquo;download-model.py&rdquo; file can be executed by initiating a new model download through the application&rsquo;s &ldquo;Model&rdquo; menu. Successful exploitation leads to arbitrary code execution within the context of the application. This vulnerability was patched in version 4.1.1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the text-generation-webui application with high privileges.</li>
<li>Attacker crafts a malicious Python script (e.g., containing reverse shell code).</li>
<li>Attacker saves the malicious script as an extension setting in &ldquo;.py&rdquo; format, leveraging path traversal to target the application&rsquo;s root directory. The filename is chosen to overwrite &ldquo;download-model.py&rdquo;.</li>
<li>The application saves the malicious &ldquo;.py&rdquo; file, overwriting the original &ldquo;download-model.py&rdquo; in the application root.</li>
<li>Attacker navigates to the &ldquo;Model&rdquo; menu within the text-generation-webui.</li>
<li>Attacker initiates the download of a new model, triggering the execution of the (now compromised) &ldquo;download-model.py&rdquo; file.</li>
<li>The malicious Python code within &ldquo;download-model.py&rdquo; executes, granting the attacker arbitrary code execution on the server.</li>
<li>The attacker establishes a reverse shell connection to their controlled system, achieving full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35050 allows a high-privileged attacker to achieve arbitrary code execution on the server hosting the text-generation-webui application. This could lead to complete system compromise, data exfiltration, and denial of service. The impact is critical due to the ease of exploitation and the potential for significant damage. Organizations using vulnerable versions of text-generation-webui are at risk of having their systems compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade text-generation-webui to version 4.1.1 or later to patch CVE-2026-35050.</li>
<li>Implement strict file permission controls to prevent unauthorized modification of critical application files, mitigating similar path traversal vulnerabilities.</li>
<li>Monitor web server logs for unusual file creation events in the application root directory to detect potential exploitation attempts (see example Sigma rule below targeting file creation in the webserver category).</li>
<li>Inspect network connections originating from the text-generation-webui server for suspicious outbound connections, which could indicate a reverse shell or other malicious activity resulting from code execution. Deploy the provided Sigma rule to detect such connections.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path traversal</category><category>code execution</category><category>text-generation-webui</category></item></channel></rss>