PT-2026-30858 · Oobabooga · Text-Generation-Webui
Published
2026-04-07
·
Updated
2026-04-07
·
CVE-2026-35485
CVSS v3.1
7.5
High
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load grammar() allows reading any file on the server filesystem with no extension restriction. Gradio does not server-side validate dropdown values, so an attacker can POST directory traversal payloads (e.g., ../../../etc/passwd) via the API and receive the full file contents in the response. This vulnerability is fixed in 4.3.
Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Text-Generation-Webui