CVE-2026-35483
Received Received - Intake
Path Traversal in text-generation-webui Allows Arbitrary File Read

Publication date: 2026-04-07

Last updated on: 2026-04-24

Assigner: GitHub, Inc.

Description
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_template() allows reading files with .jinja, .jinja2, .yaml, or .yml extensions from anywhere on the server filesystem. For .jinja files the content is returned verbatim; for .yaml files a parsed key is extracted. This vulnerability is fixed in 4.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-24
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oobabooga textgen to 4.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to read arbitrary files with certain extensions from anywhere on the server filesystem, leading to a confidentiality breach.

Such unauthorized access to sensitive files could potentially expose personal or protected data, which may impact compliance with data protection regulations like GDPR or HIPAA that require safeguarding confidential information.

However, the provided information does not explicitly mention specific compliance impacts or regulatory considerations.


Can you explain this vulnerability to me?

CVE-2026-35483 is a path traversal vulnerability in the load_template() function of the text-generation-webui project versions prior to 4.3.

This vulnerability allows an unauthenticated attacker to read arbitrary files with extensions .jinja, .jinja2, .yaml, or .yml from anywhere on the server filesystem.

The issue arises because the function constructs file paths by concatenating a base directory with a user-supplied name parameter without proper sanitization, allowing path traversal sequences like '../' to escape the intended directory.

For .jinja files, the content is returned verbatim, while for .yaml files, a specific key's value is parsed and extracted.

This vulnerability can be exploited remotely without any authentication or user interaction.


How can this vulnerability impact me? :

This vulnerability can lead to a confidentiality breach by allowing attackers to read sensitive files on the server that have the specified extensions.

Since no authentication or privileges are required, an attacker can remotely exfiltrate files containing potentially sensitive information.

There is no impact on integrity or availability, but the exposure of confidential data can have serious consequences depending on the contents of the accessed files.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to exploit the path traversal in the load_template() function by sending crafted requests that include path traversal sequences (e.g., ../) in the template name parameter.

A practical detection method is to monitor or test the API endpoint that accepts the template name parameter for responses that include contents of files outside the intended directory, especially files with extensions .jinja, .jinja2, .yaml, or .yml.

  • Use curl or similar tools to send requests with traversal payloads, for example:
  • curl -X POST http://<target>/api/load_template -d '{"name": "../../../../etc/passwd"}'
  • Check if the response contains contents of files outside the expected directory.

Additionally, review server logs for unusual requests containing ../ sequences in the template name parameter.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the text-generation-webui package to version 4.3 or later, where this vulnerability has been fixed.

If upgrading is not immediately possible, apply input sanitization to the template name parameter to neutralize path traversal characters before the path is constructed.

  • Use functions like os.path.basename(name) or the existing clean_path() function to remove or replace '..' sequences.
  • Restrict access to the vulnerable API endpoint to trusted users or networks until the patch is applied.

Monitor logs for suspicious access patterns involving path traversal attempts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart