top of page
perceptive_background_267k.jpg

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.1.1, users can save extention settings in "py" format and in…

Published:

5 april 2026 om 22:00:00

Alert date:

6 april 2026 om 19:03:35

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Emerging Technologies

CVE-2026-35050 affects text-generation-webui, an open-source web interface for running Large Language Models. Prior to version 4.1.1, users could save extension settings in Python format within the app root directory, enabling attackers to overwrite critical Python files like download-model.py. This arbitrary file overwrite vulnerability could lead to code execution when the overwritten files are triggered through the Model menu during model downloads. The vulnerability has been patched in version 4.1.1.

Technical details

Mitigation steps:

Affected products:

text-generation-webui

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page