PT-2026-30858 · Oobabooga · Text-Generation-Webui

Published

2026-04-07

·

Updated

2026-04-07

·

CVE-2026-35485

CVSS v3.1

7.5

High

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load grammar() allows reading any file on the server filesystem with no extension restriction. Gradio does not server-side validate dropdown values, so an attacker can POST directory traversal payloads (e.g., ../../../etc/passwd) via the API and receive the full file contents in the response. This vulnerability is fixed in 4.3.

Fix

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2026-35485

Affected Products

Text-Generation-Webui